Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
s0VxndYXq0

Overview

General Information

Sample Name:s0VxndYXq0 (renamed file extension from none to exe)
Analysis ID:679299
MD5:de9784a4f56eaf8affc96754a15a5cd3
SHA1:35c361a8bfdb894e80fe99728e60ad7d08745af1
SHA256:f384a96582763be490ea4eeed6d3f10291d7df964f64db077b4d10697149a7da
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Remcos RAT
Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Uses ping.exe to check the status of other devices and networks
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Uses ping.exe to sleep
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • s0VxndYXq0.exe (PID: 2732 cmdline: "C:\Users\user\Desktop\s0VxndYXq0.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • s0VxndYXq0.exe (PID: 3264 cmdline: C:\Users\user\Desktop\s0VxndYXq0.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
      • cmd.exe (PID: 3704 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" " MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 3708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • PING.EXE (PID: 5088 cmdline: PING 127.0.0.1 -n 2 MD5: 70C24A306F768936563ABDADB9CA9108)
        • remcos.exe (PID: 3908 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 1924 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 5456 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
          • remcos.exe (PID: 3572 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • remcos.exe (PID: 5540 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • remcos.exe (PID: 5580 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • remcos.exe (PID: 4776 cmdline: "C:\Users\user\remcos\remcos.exe" MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
    • remcos.exe (PID: 5832 cmdline: C:\Users\user\remcos\remcos.exe MD5: DE9784A4F56EAF8AFFC96754A15A5CD3)
  • cleanup
{"Host:Port:Password": "79.134.225.97:8600:123456|", "Assigned name": "Host", "Connect interval": "5", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "User Profile", "Copy file": "remcos.exe", "Startup value": "remcos", "Hide file": "Disable", "Mutex": "remcos_totevzugmgbhhbj", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screens", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "audio", "Connect delay": "0", "Copy folder": "remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
s0VxndYXq0.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\remcos\remcos.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
        • 0x1afb8:$remcos: Remcos
        • 0x1b82c:$remcos: Remcos
        • 0x1b864:$url: Breaking-Security.Net
        • 0x20086:$resource: SETTINGS
        00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
            • 0x72b64:$remcos: Remcos
            • 0x733d8:$remcos: Remcos
            • 0x73410:$url: Breaking-Security.Net
            • 0x77c32:$resource: SETTINGS
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            0.2.s0VxndYXq0.exe.452e400.8.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.s0VxndYXq0.exe.452e400.8.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
              • 0x10738:$s1: \Classes\mscfile\shell\open\command
              • 0x10720:$s2: eventvwr.exe
              0.2.s0VxndYXq0.exe.452e400.8.unpackRemcos_1Remcos Payloadkevoreilly
              • 0x11034:$name: Remcos
              • 0x118a8:$name: Remcos
              • 0x118fb:$name: REMCOS
              • 0x10688:$time: %02i:%02i:%02i:%03i
              • 0x11320:$time: %02i:%02i:%02i:%03i
              • 0x29fc:$crypto: 0F B6 96 08 04 00 00 89 10 8B 45 08 8D 34 07 8B 01 03 C2 8B CB 99 F7 F9 8A 84 95 F4 FB FF FF 30 06 47 3B 7D 0C 72
              0.2.s0VxndYXq0.exe.452e400.8.unpackRemcosdetect Remcos in memoryJPCERT/CC Incident Response Group
              • 0x11034:$remcos: Remcos
              • 0x118a8:$remcos: Remcos
              • 0x118e0:$url: Breaking-Security.Net
              • 0x160ea:$resource: SETTINGS
              0.2.s0VxndYXq0.exe.452e400.8.unpackREMCOS_RAT_variantsunknownunknown
              • 0x114dc:$funcs1: autogetofflinelogs
              • 0x114c0:$funcs2: clearlogins
              • 0x114f0:$funcs3: getofflinelogs
              • 0x11578:$funcs4: execcom
              • 0x114cc:$funcs5: deletekeylog
              • 0x11798:$funcs6: remscriptexecd
              • 0x115bc:$funcs7: getwindows
              • 0x10da0:$funcs8: fundlldata
              • 0x10d78:$funcs9: getfunlib
              • 0x107ec:$funcs10: autofflinelogs
              • 0x113b8:$funcs11: getclipboard
              • 0x114b4:$funcs12: getscrslist
              • 0x107e0:$funcs13: offlinelogs
              • 0x105c8:$funcs14: getcamsingleframe
              • 0x116e4:$funcs15: listfiles
              • 0x115e0:$funcs16: getproclist
              • 0x10828:$funcs17: onlinelogs
              • 0x11700:$funcs18: getdrives
              • 0x11784:$funcs19: remscriptsuccess
              • 0x10600:$funcs20: getcamframe
              • 0x1115c:$str_a1: C:\Windows\System32\cmd.exe
              Click to see the 56 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: s0VxndYXq0.exeVirustotal: Detection: 53%Perma Link
              Source: s0VxndYXq0.exeReversingLabs: Detection: 53%
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR
              Source: s0VxndYXq0.exeAvira: detected
              Source: C:\Users\user\remcos\remcos.exeAvira: detection malicious, Label: TR/Kryptik.wodao
              Source: C:\Users\user\remcos\remcos.exeReversingLabs: Detection: 53%
              Source: s0VxndYXq0.exeJoe Sandbox ML: detected
              Source: C:\Users\user\remcos\remcos.exeJoe Sandbox ML: detected
              Source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "79.134.225.97:8600:123456|", "Assigned name": "Host", "Connect interval": "5", "Install flag": "Enable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "User Profile", "Copy file": "remcos.exe", "Startup value": "remcos", "Hide file": "Disable", "Mutex": "remcos_totevzugmgbhhbj", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screens", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "audio", "Connect delay": "0", "Copy folder": "remcos", "Keylog folder": "remcos"}
              Source: s0VxndYXq0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: s0VxndYXq0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Networking

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: Yara matchFile source: s0VxndYXq0.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.s0VxndYXq0.exe.550000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: C:\Users\user\remcos\remcos.exe, type: DROPPED
              Source: Malware configuration extractorURLs: 79.134.225.97
              Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
              Source: Joe Sandbox ViewIP Address: 79.134.225.97 79.134.225.97
              Source: global trafficTCP traffic: 192.168.2.4:49765 -> 79.134.225.97:8600
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.97
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://bit.ly/unCoIY?http://lolnotes-
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://bladecoding.com/lolnotes/leagueofstats.php?name=
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
              Source: s0VxndYXq0.exe, 00000000.00000003.243809889.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243932808.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243586194.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244127013.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244021936.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243771965.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243848246.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244328823.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244234942.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.249288953.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274138797.0000000005B2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agfamonotype.cw
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274032296.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.264248405.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
              Source: s0VxndYXq0.exe, 00000000.00000003.237525657.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237981073.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238107631.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: s0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: s0VxndYXq0.exe, 00000000.00000003.237710320.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
              Source: s0VxndYXq0.exe, 00000000.00000003.238476266.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238443260.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersa
              Source: s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerse
              Source: s0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237910949.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237851832.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237952730.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerses-es_tradnlw
              Source: s0VxndYXq0.exe, 00000000.00000003.244112658.0000000005B1C000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com7
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsR
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsk
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
              Source: s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comictav
              Source: s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/%
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
              Source: s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l-g
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: http://www.lolking.net/summoner/
              Source: s0VxndYXq0.exe, 00000000.00000003.237033632.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237070417.0000000005B20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.Wb
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: https://github.com/high6/LoLNotes
              Source: s0VxndYXq0.exe, remcos.exe.5.drString found in binary or memory: https://raw.github.com/bladecoding/LoLNotes/master/General.txtO
              Source: remcos.exe, 00000009.00000002.322144849.0000000000D1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos Payload Author: kevoreilly
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
              Source: s0VxndYXq0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos_1 author = kevoreilly, description = Remcos Payload, cape_type = Remcos Payload
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Remcos hash1 = 7d5efb7e8b8947e5fe1fa12843a2faa0ebdfd7137582e5925a0b9c6a9350b0a5, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
              Source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTRMatched rule: webshell_jsp_generic_base64 date = 2021/01/24, author = Arnim Rupp, description = Generic JSP webshell with base64 encoded payload, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 1b916afdd415dfa4e77cecf47321fd676ba2184d
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_029DE4FC0_2_029DE4FC
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A53C00_2_075A53C0
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A69880_2_075A6988
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075AA3B80_2_075AA3B8
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeCode function: 0_2_075A53B00_2_075A53B0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_00F8E4FC9_2_00F8E4FC
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_070069889_2_07006988
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_070053C09_2_070053C0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0700A3B89_2_0700A3B8
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_070053B09_2_070053B0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADCC0789_2_0ADCC078
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADCC6E09_2_0ADCC6E0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC21F09_2_0ADC21F0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC21E19_2_0ADC21E1
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE7AA09_2_0AEE7AA0
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE00409_2_0AEE0040
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE00399_2_0AEE0039
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0AEE8CF09_2_0AEE8CF0
              Source: s0VxndYXq0.exe, 00000000.00000002.276887769.00000000075C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.267398551.0000000002ACF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.267211444.0000000002A71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFroor.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000003.253119443.00000000088CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePlates.dll4 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000000.224015352.0000000000552000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.278244309.000000000B4F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000000.00000002.268898105.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSchedulingClerk.dll. vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exe, 00000005.00000003.263421070.000000000111B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exeBinary or memory string: OriginalFilenameChannelServicesD.exe2 vs s0VxndYXq0.exe
              Source: s0VxndYXq0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: remcos.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: s0VxndYXq0.exeVirustotal: Detection: 53%
              Source: s0VxndYXq0.exeReversingLabs: Detection: 53%
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile read: C:\Users\user\Desktop\s0VxndYXq0.exeJump to behavior
              Source: s0VxndYXq0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe "C:\Users\user\Desktop\s0VxndYXq0.exe"
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: unknownProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: unknownProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe"
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exe
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exeJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2 Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe" Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8856F961-340A-11D0-A96B-00C04FD705A2}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\s0VxndYXq0.exe.logJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\AppData\Local\Temp\install.batJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@23/5@0/2
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: s0VxndYXq0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\remcos\remcos.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\remcos\remcos.exeMutant created: \Sessions\1\BaseNamedObjects\remcos_totevzugmgbhhbj
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3708:120:WilError_01
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: s0VxndYXq0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: s0VxndYXq0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_07004C20 pushfd ; iretd 9_2_07004C21
              Source: C:\Users\user\remcos\remcos.exeCode function: 9_2_0ADC5FAC push edx; ret 9_2_0ADC5FB3
              Source: initial sampleStatic PE information: section name: .text entropy: 7.366377921746369
              Source: initial sampleStatic PE information: section name: .text entropy: 7.366377921746369
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeFile created: C:\Users\user\remcos\remcos.exeJump to dropped file
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run remcosJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run remcosJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351006623.0000000002F8B000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000016.00000002.374683263.000000000336D000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: D/PD/P`\YISBIEDLL.DLL
              Source: s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: D/PD/P`\COSBIEDLL.DLL
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2 Jump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exe TID: 4288Thread sleep time: -45877s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exe TID: 1400Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 2960Thread sleep time: -45877s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 3584Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 5536Thread sleep time: -45877s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 2860Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 3656Thread sleep time: -45877s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 5752Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\remcos\remcos.exe TID: 2188Thread sleep time: -50000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\remcos\remcos.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 45877Jump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 45877Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000005.00000002.268992522.0000000000410000.00000040.00000400.00020000.00000000.sdmp, remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, remcos.exe, 0000001A.00000002.341382253.0000000000410000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: @HARDWARE\ACPI\DSDT\VBOX__PROCMON_WINDOW_CLASSPROCEXPL21invalid vector<T> subscript?playaudiodatafmt WAVERIFF.wav%Y-%m-%d %H.%MgetcamsingleframenocamerastartcamcapclosecamgetcamframeinitcamcapFreeFrameGetFrameCloseCameraOpenCameracamdlldatacamframe|dmc|[DataStart][DataStart]0000%02i:%02i:%02i:%03i [KeepAlive] Enabled! (Timeout: %i seconds)
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\remcos\remcos.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeMemory written: C:\Users\user\Desktop\s0VxndYXq0.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\remcos\remcos.exeMemory written: C:\Users\user\remcos\remcos.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\remcos\remcos.exeMemory written: C:\Users\user\remcos\remcos.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Users\user\Desktop\s0VxndYXq0.exe C:\Users\user\Desktop\s0VxndYXq0.exeJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE PING 127.0.0.1 -n 2 Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\remcos\remcos.exe "C:\Users\user\remcos\remcos.exe" Jump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\remcos\remcos.exeProcess created: C:\Users\user\remcos\remcos.exe C:\Users\user\remcos\remcos.exeJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Users\user\Desktop\s0VxndYXq0.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Users\user\remcos\remcos.exe VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\remcos\remcos.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\s0VxndYXq0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d17888.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bab5e4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d021b0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.2d0b63c.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2bb7830.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.s0VxndYXq0.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.452e400.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.4545420.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.remcos.exe.2ba2158.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.s0VxndYXq0.exe.45131e0.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 2732, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: s0VxndYXq0.exe PID: 3264, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3908, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5540, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 3572, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: remcos.exe PID: 5580, type: MEMORYSTR
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: s0VxndYXq0.exe, 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: remcos.exe, 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Inj
              Source: remcos.exe, 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \uninstall.batEXEpathC:\WINDOWS\system32\userinit.exeexplorer.exeupdate.batAppDataProgramFiles\SysWOW64\system32WinDirSystemDrive@@ (32 bit) (64 bit)SOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameInjRemcos_Mutex_InjSoftware\SetProcessDEPPolicyShell32IsUserAnAdminGetComputerNameExWIsWow64Processkernel32kernel32.dllGlobalMemoryStatusExGetModuleFileNameExWKernel32.dllPsapi.dllGetModuleFileNameExAProgram Files (x86)\Program Files\SETTINGS
              Source: remcos.exe, 0000001C.00000002.367697487.0000000000E27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Remcos_Mutex_Injser
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Scripting
              1
              Registry Run Keys / Startup Folder
              111
              Process Injection
              1
              Masquerading
              1
              Input Capture
              21
              Security Software Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              Registry Run Keys / Startup Folder
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Non-Standard Port
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Remote Access Software
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
              Process Injection
              NTDS1
              Remote System Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer1
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Scripting
              LSA Secrets1
              System Network Configuration Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items2
              Software Packing
              DCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 679299 Sample: s0VxndYXq0 Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus / Scanner detection for submitted sample 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 7 other signatures 2->58 9 s0VxndYXq0.exe 3 2->9         started        13 remcos.exe 2 2->13         started        15 remcos.exe 2 2->15         started        process3 file4 46 C:\Users\user\AppData\...\s0VxndYXq0.exe.log, ASCII 9->46 dropped 64 Injects a PE file into a foreign processes 9->64 17 s0VxndYXq0.exe 1 5 9->17         started        20 remcos.exe 13->20         started        22 remcos.exe 15->22         started        signatures5 process6 file7 42 C:\Users\user\remcos\remcos.exe, PE32 17->42 dropped 44 C:\Users\user\...\remcos.exe:Zone.Identifier, ASCII 17->44 dropped 24 cmd.exe 1 17->24         started        process8 signatures9 60 Uses ping.exe to sleep 24->60 62 Uses ping.exe to check the status of other devices and networks 24->62 27 remcos.exe 3 24->27         started        30 PING.EXE 1 24->30         started        33 conhost.exe 24->33         started        process10 dnsIp11 66 Antivirus detection for dropped file 27->66 68 Multi AV Scanner detection for dropped file 27->68 70 Machine Learning detection for dropped file 27->70 72 Injects a PE file into a foreign processes 27->72 35 remcos.exe 1 2 27->35         started        38 remcos.exe 27->38         started        40 remcos.exe 27->40         started        50 127.0.0.1 unknown unknown 30->50 signatures12 process13 dnsIp14 48 79.134.225.97, 49765, 49770, 49772 FINK-TELECOM-SERVICESCH Switzerland 35->48

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              s0VxndYXq0.exe54%VirustotalBrowse
              s0VxndYXq0.exe54%ReversingLabsByteCode-MSIL.Trojan.Woreflint
              s0VxndYXq0.exe100%AviraTR/Kryptik.wodao
              s0VxndYXq0.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\remcos\remcos.exe100%AviraTR/Kryptik.wodao
              C:\Users\user\remcos\remcos.exe100%Joe Sandbox ML
              C:\Users\user\remcos\remcos.exe54%ReversingLabsByteCode-MSIL.Trojan.Woreflint
              SourceDetectionScannerLabelLinkDownload
              0.2.s0VxndYXq0.exe.452e400.8.unpack100%AviraHEUR/AGEN.1219514Download File
              5.0.s0VxndYXq0.exe.400000.0.unpack100%AviraHEUR/AGEN.1219514Download File
              0.2.s0VxndYXq0.exe.4545420.9.unpack100%AviraHEUR/AGEN.1219514Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://bladecoding.com/lolnotes/leagueofstats.php?name=0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.fontbureau.comalsR0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.fontbureau.comessed0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              79.134.225.973%VirustotalBrowse
              79.134.225.970%Avira URL Cloudsafe
              http://www.agfamonotype.cw0%Avira URL Cloudsafe
              http://www.fontbureau.comalsF0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.fontbureau.comictav0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/%0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.fontbureau.com70%Avira URL Cloudsafe
              http://www.fontbureau.comalsk0%Avira URL Cloudsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.fontbureau.com.TTF0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/l-g0%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.comd0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.monotype.Wb0%Avira URL Cloudsafe
              http://www.fontbureau.comm0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              79.134.225.97true
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.fontbureau.com/designersGs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://bladecoding.com/lolnotes/leagueofstats.php?name=s0VxndYXq0.exe, remcos.exe.5.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersFs0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThes0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.lolking.net/summoner/s0VxndYXq0.exe, remcos.exe.5.drfalse
                        high
                        http://www.fontbureau.comalsRs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designerss0VxndYXq0.exe, 00000000.00000003.237525657.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comesseds0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.krs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersPs0VxndYXq0.exe, 00000000.00000003.237710320.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.agfamonotype.cws0VxndYXq0.exe, 00000000.00000003.243809889.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243932808.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243586194.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244127013.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244021936.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243771965.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.243848246.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244328823.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244234942.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.249288953.0000000005B2A000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274138797.0000000005B2A000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comalsFs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cThes0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersas0VxndYXq0.exe, 00000000.00000003.238476266.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238443260.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designerses0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comictavs0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleases0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fonts.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/%s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sandoll.co.krs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleases0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com7s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comalsks0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zhongyicts.com.cns0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com.TTFs0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersts0VxndYXq0.exe, 00000000.00000003.244112658.0000000005B1C000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244079552.0000000005B1C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/l-gs0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/Ys0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.coms0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274032296.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.264248405.0000000005AEB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://raw.github.com/bladecoding/LoLNotes/master/General.txtOs0VxndYXq0.exe, remcos.exe.5.drfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/jp/s0VxndYXq0.exe, 00000000.00000003.236244264.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comas0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designerses-es_tradnlws0VxndYXq0.exe, 00000000.00000003.237791179.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237910949.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237771360.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237851832.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237819421.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237952730.0000000005B1E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comds0VxndYXq0.exe, 00000000.00000003.238946519.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.carterandcone.comls0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://github.com/high6/LoLNotess0VxndYXq0.exe, remcos.exe.5.drfalse
                                              high
                                              http://www.fontbureau.com/designers/cabarga.htmlNs0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cns0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmls0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237981073.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238107631.0000000005B1D000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.monotype.Wbs0VxndYXq0.exe, 00000000.00000003.237033632.0000000005B1E000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.237070417.0000000005B20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.comms0VxndYXq0.exe, 00000000.00000003.244188865.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244610211.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.244375972.0000000005AED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/s0VxndYXq0.exe, 00000000.00000003.236102854.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.236394837.0000000005AEC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://bit.ly/unCoIY?http://lolnotes-s0VxndYXq0.exe, remcos.exe.5.drfalse
                                                    high
                                                    http://www.fontbureau.com/designers8s0VxndYXq0.exe, 00000000.00000002.274487686.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, s0VxndYXq0.exe, 00000000.00000003.238027244.0000000005B1D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      79.134.225.97
                                                      unknownSwitzerland
                                                      6775FINK-TELECOM-SERVICESCHtrue
                                                      IP
                                                      127.0.0.1
                                                      Joe Sandbox Version:35.0.0 Citrine
                                                      Analysis ID:679299
                                                      Start date and time: 05/08/202214:59:082022-08-05 14:59:08 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 8m 27s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Sample file name:s0VxndYXq0 (renamed file extension from none to exe)
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:37
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@23/5@0/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:Failed
                                                      HCA Information:
                                                      • Successful, ratio: 92%
                                                      • Number of executed functions: 207
                                                      • Number of non-executed functions: 2
                                                      Cookbook Comments:
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      15:00:21API Interceptor2x Sleep call for process: s0VxndYXq0.exe modified
                                                      15:00:30AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run remcos "C:\Users\user\remcos\remcos.exe"
                                                      15:00:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run remcos "C:\Users\user\remcos\remcos.exe"
                                                      15:00:43API Interceptor6x Sleep call for process: remcos.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      79.134.225.971sqNsxHsed.exeGet hashmaliciousBrowse
                                                        ENQUIRY # 12201408_06202022.exeGet hashmaliciousBrowse
                                                          doc_69257199432-97424323002.pdf.vbsGet hashmaliciousBrowse
                                                            iXQth4acZ7.exeGet hashmaliciousBrowse
                                                              JAAX1VADNG.exeGet hashmaliciousBrowse
                                                                C202000000164556_pdf.exeGet hashmaliciousBrowse
                                                                  fattura di pagamento 0CV1-005444pdf.exeGet hashmaliciousBrowse
                                                                    bonifico.exeGet hashmaliciousBrowse
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      FINK-TELECOM-SERVICESCHModel list set 20 USD4 8 HPID 90CUI 874.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.53
                                                                      ACH_221515_Payment_Advice.xlsGet hashmaliciousBrowse
                                                                      • 79.134.225.28
                                                                      remittance advice.xlsGet hashmaliciousBrowse
                                                                      • 79.134.225.22
                                                                      remittance advice.xls - Copy.xlsGet hashmaliciousBrowse
                                                                      • 79.134.225.22
                                                                      remittance advice.xlsGet hashmaliciousBrowse
                                                                      • 79.134.225.22
                                                                      remittance advice.xlsGet hashmaliciousBrowse
                                                                      • 79.134.225.22
                                                                      gunzipped.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.113
                                                                      Order Inqury'012-1-08-22.jarGet hashmaliciousBrowse
                                                                      • 79.134.225.85
                                                                      Order Inqury'012-1-08-22.jarGet hashmaliciousBrowse
                                                                      • 79.134.225.85
                                                                      triage_dropped_file.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.33
                                                                      RegAsm.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.119
                                                                      e969e5d52792da33934e8aebae044a1c.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.119
                                                                      Enquiry #378893.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.54
                                                                      QUOTATION REQUEST 20320202.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.54
                                                                      RFQ Number OQ22018931.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.54
                                                                      Fiche N#U00b0248-2 Impots Fiscal.lnkGet hashmaliciousBrowse
                                                                      • 79.134.225.10
                                                                      NZ6REqDv6K.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.10
                                                                      doc_41617304446-5779329884601.vbsGet hashmaliciousBrowse
                                                                      • 79.134.225.116
                                                                      010299823D93A9793D8719F39876A45AF3A9AD4FAFBCD.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.107
                                                                      wBG6L1xH1r.exeGet hashmaliciousBrowse
                                                                      • 79.134.225.102
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\remcos\remcos.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1308
                                                                      Entropy (8bit):5.345811588615766
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1308
                                                                      Entropy (8bit):5.345811588615766
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):83
                                                                      Entropy (8bit):4.660536268409599
                                                                      Encrypted:false
                                                                      SSDEEP:3:cQxCvfn9m1t+CQHovBkwbM2n:cQ2fE1wCSovKwo2n
                                                                      MD5:F153731DF7A038F42AAA8D34E873FF25
                                                                      SHA1:1C90ACC2243D0DBEDEB28A8F7F719E605D80894D
                                                                      SHA-256:BC24BC26EE03AE15EE552CADF887C9FC201D19D76944321883E5C818D0E8A4AF
                                                                      SHA-512:F16A79B8A04E90B7B8F43D3001D51FDDDDC07B8D117D1CF978C35C96DDFFD161E6901DA5446EB42758DC980FC79ADC8BCA1B5DA640AB294BD24A8944FF0D01CA
                                                                      Malicious:false
                                                                      Preview:PING 127.0.0.1 -n 2 ..start "" "C:\Users\user\remcos\remcos.exe"..del %0 ..exit ..
                                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):950272
                                                                      Entropy (8bit):7.359178629458712
                                                                      Encrypted:false
                                                                      SSDEEP:12288:4Rb0kj3oTB2b2UVFdPBGjIKHfrLPVPf1cLlq+R3rU8weZd+ydGRuwJGdaTuM18N5:4RA0siGjIKHf/NH1eFR7U8wWkTRk
                                                                      MD5:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      SHA1:35C361A8BFDB894E80FE99728E60AD7D08745AF1
                                                                      SHA-256:F384A96582763BE490EA4EEED6D3F10291D7DF964F64DB077B4D10697149A7DA
                                                                      SHA-512:8576E0ED22421F70350A1108129E6DFA0190335724561CA5093E22A8CEB2E6AD0D61DB77A86C4603C60F4627C091D576B9174DAA2C0545D9D1E032502BC19E3E
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\remcos\remcos.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: Avira, Detection: 100%
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      • Antivirus: ReversingLabs, Detection: 54%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.b..............0..`..........n~... ........@.. ....................................@..................................~..W.................................................................................... ............... ..H............text...t^... ...`.................. ..`.rsrc................b..............@..@.reloc...............~..............@..B................P~......H........E..|8......+...X...@E............................................U.....U..`.E.f.8.u...3..f9H.u..@.....a.........0..........*....0...........(.....*.0...........(.....*.0...........(.....*.0..<........(#.......(.......(.......(........(........(........(.....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0...........{....*..0............}....*.0..........
                                                                      Process:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.359178629458712
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                      File name:s0VxndYXq0.exe
                                                                      File size:950272
                                                                      MD5:de9784a4f56eaf8affc96754a15a5cd3
                                                                      SHA1:35c361a8bfdb894e80fe99728e60ad7d08745af1
                                                                      SHA256:f384a96582763be490ea4eeed6d3f10291d7df964f64db077b4d10697149a7da
                                                                      SHA512:8576e0ed22421f70350a1108129e6dfa0190335724561ca5093e22a8ceb2e6ad0d61db77a86c4603c60f4627c091d576b9174daa2c0545d9d1e032502bc19e3e
                                                                      SSDEEP:12288:4Rb0kj3oTB2b2UVFdPBGjIKHfrLPVPf1cLlq+R3rU8weZd+ydGRuwJGdaTuM18N5:4RA0siGjIKHf/NH1eFR7U8wWkTRk
                                                                      TLSH:5D155A99369071EFC857C976CA682C50FB31B576930FD207A45322ADAE0D6ABDF101F2
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.b..............0..`..........n~... ........@.. ....................................@................................
                                                                      Icon Hash:397165848c36a18d
                                                                      Entrypoint:0x4e7e6e
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x62E047C2 [Tue Jul 26 20:00:02 2022 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe7e140x57.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x1a90.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xe5e740xe6000False0.7169316830842392data7.366377921746369IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xe80000x1a900x1c00False0.45717075892857145data5.558425499312093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xea0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_ICON0xe81600xd28data
                                                                      RT_GROUP_ICON0xe8e880x14data
                                                                      RT_GROUP_ICON0xe8e9c0x14data
                                                                      RT_VERSION0xe8eb00x33cdata
                                                                      RT_MANIFEST0xe91ec0x8a3XML 1.0 document, UTF-8 Unicode (with BOM) text
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Aug 5, 2022 15:00:51.489784956 CEST497658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:51.547962904 CEST86004976579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:00:52.065028906 CEST497658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:52.123380899 CEST86004976579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:00:52.709264040 CEST497658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:52.767832994 CEST86004976579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:00:57.773063898 CEST497708600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:57.832314014 CEST86004977079.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:00:58.334733009 CEST497708600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:58.393183947 CEST86004977079.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:00:59.022278070 CEST497708600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:00:59.080661058 CEST86004977079.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:04.092365980 CEST497728600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:04.150609970 CEST86004977279.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:04.710223913 CEST497728600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:04.768486977 CEST86004977279.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:05.413645983 CEST497728600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:05.472306967 CEST86004977279.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:10.476984978 CEST497738600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:10.535494089 CEST86004977379.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:11.132644892 CEST497738600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:11.191097975 CEST86004977379.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:11.835798979 CEST497738600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:11.897294044 CEST86004977379.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:16.906243086 CEST497748600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:16.964862108 CEST86004977479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:17.602025032 CEST497748600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:17.660366058 CEST86004977479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:18.211484909 CEST497748600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:18.269845963 CEST86004977479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:23.275614977 CEST497768600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:23.334021091 CEST86004977679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:23.914994955 CEST497768600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:23.973387957 CEST86004977679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:24.602653980 CEST497768600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:24.661000013 CEST86004977679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:29.691310883 CEST498018600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:29.749579906 CEST86004980179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:30.337486982 CEST498018600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:30.395963907 CEST86004980179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:31.024995089 CEST498018600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:31.083328009 CEST86004980179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:36.541906118 CEST498198600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:36.600670099 CEST86004981979.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:37.135059118 CEST498198600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:37.193582058 CEST86004981979.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:37.838089943 CEST498198600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:37.896397114 CEST86004981979.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:42.902713060 CEST498278600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:42.961273909 CEST86004982779.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:43.463576078 CEST498278600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:43.522169113 CEST86004982779.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:44.026073933 CEST498278600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:44.084547043 CEST86004982779.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:49.099905968 CEST498368600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:49.158422947 CEST86004983679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:49.667279005 CEST498368600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:49.725716114 CEST86004983679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:50.229877949 CEST498368600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:50.288291931 CEST86004983679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:56.090359926 CEST498448600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:56.148978949 CEST86004984479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:56.652179956 CEST498448600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:56.710563898 CEST86004984479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:01:57.214720964 CEST498448600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:01:57.273039103 CEST86004984479.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:02.278929949 CEST498618600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:02.337223053 CEST86004986179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:02.840158939 CEST498618600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:02.898443937 CEST86004986179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:03.402717113 CEST498618600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:03.460984945 CEST86004986179.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:09.368092060 CEST498658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:09.426564932 CEST86004986579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:10.090811968 CEST498658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:10.149149895 CEST86004986579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:10.700218916 CEST498658600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:10.758519888 CEST86004986579.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:15.763689041 CEST498668600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:15.821871996 CEST86004986679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:16.325689077 CEST498668600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:16.384908915 CEST86004986679.134.225.97192.168.2.4
                                                                      Aug 5, 2022 15:02:16.888501883 CEST498668600192.168.2.479.134.225.97
                                                                      Aug 5, 2022 15:02:16.946827888 CEST86004986679.134.225.97192.168.2.4

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:15:00:07
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\s0VxndYXq0.exe"
                                                                      Imagebase:0x550000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000000.00000002.271680078.0000000004513000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000000.00000002.268436636.0000000002CD7000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      Reputation:low

                                                                      Target ID:5
                                                                      Start time:15:00:23
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\s0VxndYXq0.exe
                                                                      Imagebase:0x930000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000000.261466626.0000000000410000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.269857625.0000000002CD0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Target ID:6
                                                                      Start time:15:00:27
                                                                      Start date:05/08/2022
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\install.bat" "
                                                                      Imagebase:0x1190000
                                                                      File size:232960 bytes
                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:7
                                                                      Start time:15:00:28
                                                                      Start date:05/08/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7338d0000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:8
                                                                      Start time:15:00:29
                                                                      Start date:05/08/2022
                                                                      Path:C:\Windows\SysWOW64\PING.EXE
                                                                      Wow64 process (32bit):true
                                                                      Commandline:PING 127.0.0.1 -n 2
                                                                      Imagebase:0x13b0000
                                                                      File size:18944 bytes
                                                                      MD5 hash:70C24A306F768936563ABDADB9CA9108
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:9
                                                                      Start time:15:00:30
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                                      Imagebase:0x530000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 00000009.00000002.336989263.0000000002B77000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\remcos\remcos.exe, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 100%, Avira
                                                                      • Detection: 100%, Joe Sandbox ML
                                                                      • Detection: 54%, ReversingLabs
                                                                      Reputation:low

                                                                      Target ID:12
                                                                      Start time:15:00:39
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                                      Imagebase:0x950000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Remcos, Description: detect Remcos in memory, Source: 0000000C.00000002.351406709.0000000002FDB000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                      Reputation:low

                                                                      Target ID:21
                                                                      Start time:15:00:47
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                                      Imagebase:0x1b0000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      Target ID:22
                                                                      Start time:15:00:47
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\remcos\remcos.exe"
                                                                      Imagebase:0xb70000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:low

                                                                      Target ID:23
                                                                      Start time:15:00:48
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                                      Imagebase:0x80000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      Target ID:24
                                                                      Start time:15:00:49
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                                      Imagebase:0x850000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.493007691.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Target ID:26
                                                                      Start time:15:01:00
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                                      Imagebase:0xbe0000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.342391067.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Target ID:28
                                                                      Start time:15:01:11
                                                                      Start date:05/08/2022
                                                                      Path:C:\Users\user\remcos\remcos.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\remcos\remcos.exe
                                                                      Imagebase:0x650000
                                                                      File size:950272 bytes
                                                                      MD5 hash:DE9784A4F56EAF8AFFC96754A15A5CD3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000002.365233653.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:12.8%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:42
                                                                        Total number of Limit Nodes:1
                                                                        execution_graph 17506 29d43f8 17507 29d440f 17506->17507 17510 29d44a8 17507->17510 17508 29d4420 17511 29d44ca 17510->17511 17512 29d44d5 17511->17512 17514 29d45a0 17511->17514 17512->17508 17515 29d45a5 17514->17515 17515->17515 17519 29d4690 17515->17519 17523 29d46a0 17515->17523 17520 29d4695 17519->17520 17521 29d47a4 17520->17521 17527 29d4338 17520->17527 17525 29d46c7 17523->17525 17524 29d47a4 17524->17524 17525->17524 17526 29d4338 CreateActCtxA 17525->17526 17526->17524 17528 29d5b30 CreateActCtxA 17527->17528 17530 29d5bf3 17528->17530 17531 29db638 17534 29db722 17531->17534 17532 29db647 17535 29db743 17534->17535 17536 29db75b 17535->17536 17542 29db9b8 17535->17542 17546 29db9a8 17535->17546 17536->17532 17537 29db753 17537->17536 17538 29db958 GetModuleHandleW 17537->17538 17539 29db985 17538->17539 17539->17532 17543 29db9cc 17542->17543 17544 29db9f1 17543->17544 17550 29db1b8 17543->17550 17544->17537 17547 29db9cc 17546->17547 17548 29db9f1 17547->17548 17549 29db1b8 LoadLibraryExW 17547->17549 17548->17537 17549->17548 17551 29dbb98 LoadLibraryExW 17550->17551 17553 29dbc11 17551->17553 17553->17544 17554 29dda30 17555 29dda96 17554->17555 17558 29ddbf0 17555->17558 17561 29dd7a4 17558->17561 17562 29ddc58 DuplicateHandle 17561->17562 17563 29ddb45 17562->17563
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6e7d777d2d935bc70463d9464e5c10228b591957c6b8957a159170d857eb50e5
                                                                        • Instruction ID: c36e30d26f7b05b133a14d7b844bfe85637dc91fe6fdb72943c0b90971e680a6
                                                                        • Opcode Fuzzy Hash: 6e7d777d2d935bc70463d9464e5c10228b591957c6b8957a159170d857eb50e5
                                                                        • Instruction Fuzzy Hash: BF524EB5B00116AFDB14DF68C894AED77B2FF89714B198469E806DB364DB35DC02CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a198622a4550cc353982816cb5404ab8976f0ecd70bcc95f5f0d2cf27fe83fe
                                                                        • Instruction ID: 2e63b50df47999d34c5be67c45874c311f8449f65837752173e809cb04fd3b9e
                                                                        • Opcode Fuzzy Hash: 5a198622a4550cc353982816cb5404ab8976f0ecd70bcc95f5f0d2cf27fe83fe
                                                                        • Instruction Fuzzy Hash: C4811474E11209DFCB04DFA5E6849DEFBB2FF89301F20852AD506B7254EB34AA51CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 396409506bccfa6c32387af770b43311f68420618706b5166bc4f07ce1b43297
                                                                        • Instruction ID: dc2c906c90242f0095623f9a746b9c1a7713baa492d41b25e2d12bef2f1f0674
                                                                        • Opcode Fuzzy Hash: 396409506bccfa6c32387af770b43311f68420618706b5166bc4f07ce1b43297
                                                                        • Instruction Fuzzy Hash: 8D710474E11209DFCB04DFA5E6849DEFBB2FF89300F20852AD506B7254EB349A55CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 029DB976
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 7167d1073422c3908127dfb4772141b11252963832ce108724a721361a7c457a
                                                                        • Instruction ID: b68f4e71c94d997f5968814b9ab5fb2e9ee691e068ebeed54b06057eb0cf6996
                                                                        • Opcode Fuzzy Hash: 7167d1073422c3908127dfb4772141b11252963832ce108724a721361a7c457a
                                                                        • Instruction Fuzzy Hash: FF712370A00B058FD724DF2AD59579ABBF5FF88208F01892ED49AD7A50D734E80A8B91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 57 29d5b24-29d5bf1 CreateActCtxA 59 29d5bfa-29d5c54 57->59 60 29d5bf3-29d5bf9 57->60 67 29d5c56-29d5c59 59->67 68 29d5c63-29d5c67 59->68 60->59 67->68 69 29d5c69-29d5c75 68->69 70 29d5c78 68->70 69->70 71 29d5c79 70->71 71->71
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 029D5BE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: ef77f8a987c8ff1b16339832a1995c470f0c722841a5474326bdc25559db1948
                                                                        • Instruction ID: 1e78ab7336ad206f0736031e6960b0cd24bcd17526dd88854f291720bffd0cfc
                                                                        • Opcode Fuzzy Hash: ef77f8a987c8ff1b16339832a1995c470f0c722841a5474326bdc25559db1948
                                                                        • Instruction Fuzzy Hash: F8411571C00618CFDB24DFA9C9857DEBBB1BF48308F248469D409BB651DB75694ACF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 73 29d4338-29d5bf1 CreateActCtxA 76 29d5bfa-29d5c54 73->76 77 29d5bf3-29d5bf9 73->77 84 29d5c56-29d5c59 76->84 85 29d5c63-29d5c67 76->85 77->76 84->85 86 29d5c69-29d5c75 85->86 87 29d5c78 85->87 86->87 88 29d5c79 87->88 88->88
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 029D5BE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 3af5df1ebe6c2bbdd56586d7fe3043bbbb63d16edf39f701d4e0fdff233d634d
                                                                        • Instruction ID: eae79e94ef0b9663e8e2ab620e756ef7a2eb77bc0e58098b7d22bf0e884185e9
                                                                        • Opcode Fuzzy Hash: 3af5df1ebe6c2bbdd56586d7fe3043bbbb63d16edf39f701d4e0fdff233d634d
                                                                        • Instruction Fuzzy Hash: B941F4B0C0021CCBDB24DFA9C984BDEBBB5BF48308F208469D409BB251DB756949CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 90 29dd7a4-29ddcec DuplicateHandle 92 29ddcee-29ddcf4 90->92 93 29ddcf5-29ddd12 90->93 92->93
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,029DDC1E,?,?,?,?,?), ref: 029DDCDF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: fdd640e6e5730e5a615b23b586cf7b810b7287e521f8df28b7ea0e23e2f1183e
                                                                        • Instruction ID: 95e27a74452594e000866e34602549241efb8a4eb9cc0d77b980af4ee61f94c3
                                                                        • Opcode Fuzzy Hash: fdd640e6e5730e5a615b23b586cf7b810b7287e521f8df28b7ea0e23e2f1183e
                                                                        • Instruction Fuzzy Hash: C821E4B5900209AFDB10CFA9D984AEEBBF8FB48324F14845AE915B3710D374A954DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 96 29dbb90-29dbbd8 97 29dbbda-29dbbdd 96->97 98 29dbbe0-29dbc0f LoadLibraryExW 96->98 97->98 99 29dbc18-29dbc35 98->99 100 29dbc11-29dbc17 98->100 100->99
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,029DB9F1,00000800,00000000,00000000), ref: 029DBC02
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 1764d12dbe2833bfee6e00af1820b55d0dcd2047e2476229a5cd31c0653ec0e2
                                                                        • Instruction ID: 17cc8fdb30dac09d06765503bbf38a7ee0316998678ccf8e80deace753dfd150
                                                                        • Opcode Fuzzy Hash: 1764d12dbe2833bfee6e00af1820b55d0dcd2047e2476229a5cd31c0653ec0e2
                                                                        • Instruction Fuzzy Hash: 6F1144B69002088FCB10CFAAC585BDEFBF4EB48364F04841AD429A7610C374A54ACFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 103 29db1b8-29dbbd8 105 29dbbda-29dbbdd 103->105 106 29dbbe0-29dbc0f LoadLibraryExW 103->106 105->106 107 29dbc18-29dbc35 106->107 108 29dbc11-29dbc17 106->108 108->107
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,029DB9F1,00000800,00000000,00000000), ref: 029DBC02
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: f6ec74962017700c99c0a72eb68d652844fd7b61e71a67d1989d306602cc40f3
                                                                        • Instruction ID: a8d15b4ec1f6afa4e53d71348673833a8b2aaeebd92cfb3115ddd5e7bf19c3c4
                                                                        • Opcode Fuzzy Hash: f6ec74962017700c99c0a72eb68d652844fd7b61e71a67d1989d306602cc40f3
                                                                        • Instruction Fuzzy Hash: DC1103B69002099FDB10CF9AC544AEEFBF8AB48364F14846EE419B7610C375A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 111 29db910-29db950 112 29db958-29db983 GetModuleHandleW 111->112 113 29db952-29db955 111->113 114 29db98c-29db9a0 112->114 115 29db985-29db98b 112->115 113->112 115->114
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 029DB976
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 75ebce0cd03cd4f53d68ff49b5e76b7bec5827164525593076c7ebfc7c84c2f9
                                                                        • Instruction ID: ccc994529e1fed28682f301b27456f82083f8053a9c3df320aaae444f571d83c
                                                                        • Opcode Fuzzy Hash: 75ebce0cd03cd4f53d68ff49b5e76b7bec5827164525593076c7ebfc7c84c2f9
                                                                        • Instruction Fuzzy Hash: 941110B6D002498FCB10CF9AC484BDEFBF8AB88328F14845AD429B7710C374A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 675 75a0040-75a004c 676 75a0052-75a0076 675->676 677 75a0150-75a0156 675->677 680 75a007c-75a0087 676->680 681 75a0157-75a0267 call 75a0040 * 2 676->681 680->681 682 75a008d-75a00b1 680->682 695 75a0269-75a0273 681->695 696 75a0275 681->696 682->681 689 75a00b7-75a00c2 682->689 689->681 691 75a00c8-75a00ef 689->691 691->681 699 75a00f1-75a00fc 691->699 698 75a0277-75a0279 695->698 696->698 700 75a028a-75a02ba 698->700 701 75a027b-75a0280 698->701 699->681 702 75a00fe-75a0114 699->702 705 75a02bc-75a02c6 700->705 706 75a02e1-75a030f call 75a0b80 700->706 701->700 707 75a0117-75a0119 702->707 705->706 708 75a02c8-75a02d5 705->708 716 75a0312-75a032d 706->716 707->681 709 75a011b-75a0123 707->709 708->706 712 75a02d7-75a02db 708->712 709->681 711 75a0125-75a012a 709->711 713 75a013a-75a013e 711->713 714 75a012c-75a0130 711->714 712->706 715 75a03ee-75a0559 712->715 713->681 718 75a0140-75a0143 713->718 714->681 717 75a0132-75a0139 714->717 786 75a055b-75a059a 715->786 787 75a059f-75a05a3 715->787 719 75a037f-75a03e9 716->719 720 75a032f-75a0360 716->720 721 75a014a-75a014e 718->721 722 75a0145-75a0149 718->722 730 75a06df-75a06e3 719->730 720->719 727 75a0362-75a0374 720->727 721->677 721->707 727->719 732 75a06ef-75a0756 730->732 733 75a06e5-75a06e9 730->733 788 75a075b-75a078c 732->788 789 75a0758 732->789 733->732 734 75a07af-75a07b3 733->734 735 75a07bf-75a0826 734->735 736 75a07b5-75a07b9 734->736 797 75a082b-75a0877 735->797 798 75a0828 735->798 736->735 739 75a087f-75a0883 736->739 740 75a0889-75a089e 739->740 741 75a0907-75a090b 739->741 740->741 751 75a08a0-75a08ff 740->751 745 75a097f-75a09b0 741->745 746 75a090d-75a0922 741->746 753 75a09bc-75a09c6 745->753 746->745 754 75a0924-75a0977 746->754 751->741 756 75a09c8-75a09ce 753->756 757 75a09d5-75a09df 753->757 754->745 756->757 761 75a09f1-75a09f8 757->761 762 75a09e1-75a09e6 757->762 764 75a09fa-75a0a45 761->764 765 75a0a47-75a0a4f 761->765 762->761 776 75a0a5d-75a0a67 764->776 765->776 777 75a0a51-75a0a56 765->777 783 75a0ab8-75a0b09 776->783 784 75a0a69-75a0ab6 776->784 777->776 830 75a0b11-75a0b30 783->830 784->830 804 75a066f-75a06d6 786->804 793 75a0606-75a0666 787->793 794 75a05a5-75a0604 787->794 823 75a0794-75a07a7 788->823 789->788 793->804 794->804 797->739 798->797 804->730 823->734
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1b52565a4411265e5688f1ae1ab0a2c65a9fab4ab82b548fdf3202fe7500772a
                                                                        • Instruction ID: 500cf37aea201d76452dbf0f5b601b1d383c2946275d12b907541ed7a155b712
                                                                        • Opcode Fuzzy Hash: 1b52565a4411265e5688f1ae1ab0a2c65a9fab4ab82b548fdf3202fe7500772a
                                                                        • Instruction Fuzzy Hash: 74720D31910609CFCB54EF68C894AEDB7B1FF45304F0086A9D549AB265FF30AA95CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 835 75aecd8-75aed0e 836 75aedc6-75aedd0 835->836 837 75aed14-75aed18 call 75ae1c0 835->837 842 75aedd8-75aedec 836->842 840 75aed1d-75aed2e 837->840 843 75aed72-75aed76 840->843 844 75aed30-75aed37 840->844 849 75aedee-75aee23 call 75ae1f0 842->849 850 75aee31-75aee35 842->850 847 75aed78-75aed7e 843->847 848 75aed96-75aed98 843->848 844->843 846 75aed39-75aed40 844->846 852 75aee8c-75aef0b call 75ae210 call 75ae220 call 75ae230 846->852 853 75aed46-75aed5c 846->853 854 75aed8b-75aed90 847->854 855 75aed80-75aed88 call 75ae1d0 847->855 848->836 851 75aed9a-75aeda0 848->851 879 75aee2e 849->879 880 75aee25 849->880 858 75aee78-75aee82 850->858 859 75aee37-75aee4a 850->859 856 75aedbc-75aedc0 851->856 857 75aeda2-75aedad call 75ae1e0 851->857 888 75aef0d-75aef1c call 75ae1d0 852->888 889 75aef32-75aef37 852->889 853->852 868 75aed62-75aed6f 853->868 854->848 855->854 856->836 857->856 872 75aedaf-75aedb9 857->872 859->852 870 75aee4c-75aee5f 859->870 868->843 870->852 874 75aee61-75aee73 call 75ae200 870->874 872->856 874->858 879->850 880->879 897 75af0c9-75af14b call 75ae270 call 75ae280 888->897 898 75aef22-75aef29 888->898 891 75aef39-75aef3d 889->891 892 75aef42-75aef50 889->892 894 75af04b-75af054 891->894 895 75aef52-75aef54 892->895 896 75aef56 892->896 902 75af072 894->902 903 75af056 894->903 899 75aef73 895->899 900 75aef58-75aef5a 896->900 901 75aef5c-75aef62 896->901 955 75af14d-75af153 897->955 956 75af154-75af189 897->956 898->897 906 75aef2f 898->906 905 75aef75-75aef77 899->905 900->899 908 75aef68-75aef6a 901->908 909 75aef64 901->909 907 75af074-75af076 902->907 903->902 904 75af058-75af061 903->904 911 75af063 904->911 912 75af067-75af069 904->912 914 75aef79-75aefa2 call 75ae240 905->914 915 75aefa5-75aefa9 905->915 906->889 916 75af078-75af092 call 75ae250 907->916 917 75af097-75af0c8 907->917 910 75aef71 908->910 918 75aef6c 909->918 919 75aef66 909->919 910->905 920 75af06b 911->920 921 75af065 911->921 922 75af070 912->922 914->915 925 75aefab 915->925 926 75aefc2 915->926 916->917 918->910 919->908 920->922 921->912 922->907 925->926 930 75aefad-75aefb1 925->930 928 75aefc4-75aefc6 926->928 933 75aefc8-75aefcc 928->933 934 75aefce-75af00e call 75ae250 928->934 935 75aefb3 930->935 936 75aefb7-75aefb9 930->936 938 75af011-75af016 933->938 934->938 940 75aefbb 935->940 941 75aefb5 935->941 942 75aefc0 936->942 945 75af018-75af01c call 75ae260 938->945 946 75af021-75af026 938->946 940->942 941->936 942->928 945->946 951 75af029-75af02e 946->951 953 75af03f-75af041 951->953 954 75af030-75af037 951->954 953->892 958 75af047-75af049 953->958 954->953 957 75af039-75af03d 954->957 961 75af191-75af193 956->961 962 75af18c call 75ae28c 956->962 957->951 957->953 958->894 963 75af1a3-75af232 961->963 964 75af195-75af1a2 call 75ae298 961->964 962->961 970 75af23b-75af258 963->970 971 75af234-75af23a 963->971 971->970
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4bb020b89ff42b44ea7957b64303939fa93800c4acaf3f980dc08c59c9b757cb
                                                                        • Instruction ID: 80813afc58ea33074d4ef9b12fc1c051e81ce09faac3641a44cff3625fd614fc
                                                                        • Opcode Fuzzy Hash: 4bb020b89ff42b44ea7957b64303939fa93800c4acaf3f980dc08c59c9b757cb
                                                                        • Instruction Fuzzy Hash: C0D1D3F0B00106EFCB15AB64C4566EEBFB1FF85340F5548BAD442A72A5E731C866CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1273 75ae640-75ae64d 1274 75ae64f-75ae652 1273->1274 1275 75ae653-75ae65a 1273->1275 1276 75ae65c-75ae65e 1275->1276 1277 75ae660-75ae667 1275->1277 1278 75ae680-75ae692 1276->1278 1279 75ae669-75ae66e 1277->1279 1280 75ae670-75ae676 1277->1280 1281 75ae698-75ae69f 1278->1281 1282 75ae694-75ae696 1278->1282 1279->1278 1280->1278 1284 75ae6a8-75ae6ae 1281->1284 1285 75ae6a1-75ae6a6 1281->1285 1283 75ae6b8-75ae6cc 1282->1283 1286 75ae6d9-75ae72f 1283->1286 1287 75ae6ce-75ae6d8 1283->1287 1284->1283 1285->1283 1293 75ae737-75ae739 1286->1293 1294 75ae73b-75ae750 1293->1294 1295 75ae753-75ae7c0 1293->1295 1303 75ae86c-75ae883 1295->1303 1304 75ae7c6-75ae7c8 1295->1304 1313 75ae889 1303->1313 1314 75ae885-75ae887 1303->1314 1305 75ae8f8-75ae99f 1304->1305 1306 75ae7ce-75ae7d9 1304->1306 1342 75ae9a8-75ae9c9 1305->1342 1343 75ae9a1-75ae9a7 1305->1343 1310 75ae7db-75ae7dd 1306->1310 1311 75ae7f6-75ae7fa 1306->1311 1315 75ae7e8-75ae7f3 call 75ab2dc 1310->1315 1316 75ae7df-75ae7e6 1310->1316 1317 75ae859-75ae862 1311->1317 1318 75ae7fc-75ae810 1311->1318 1320 75ae88e-75ae890 1313->1320 1314->1320 1315->1311 1316->1311 1327 75ae812-75ae823 call 75ab2dc 1318->1327 1328 75ae826-75ae82a 1318->1328 1322 75ae892-75ae8be 1320->1322 1323 75ae8c5-75ae8f1 1320->1323 1322->1323 1323->1305 1327->1328 1331 75ae82c 1328->1331 1332 75ae832-75ae84b 1328->1332 1331->1332 1339 75ae84d 1332->1339 1340 75ae856 1332->1340 1339->1340 1340->1317 1343->1342
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fbc47e036a71b9dde0ce9339eddd4a44e363322f7fa9f0a7e297a11f1c2e1838
                                                                        • Instruction ID: ea25abc9776c5dedf8c84f507090589ef5a3aa764889dd2ad92dcca1dd7acacd
                                                                        • Opcode Fuzzy Hash: fbc47e036a71b9dde0ce9339eddd4a44e363322f7fa9f0a7e297a11f1c2e1838
                                                                        • Instruction Fuzzy Hash: 22A1C2B1A002459FDB14EB74D44A7EE7BF6EF89314F14887AD405EB380DB388946CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ecdaaa4e96823b51510b5236227e89c38012e5ff24fefa953643a7363ee98bac
                                                                        • Instruction ID: 63d406d3763c3de8aa073cc8d72a22b10f0d0d53e2e50370c8d11773fa13b5eb
                                                                        • Opcode Fuzzy Hash: ecdaaa4e96823b51510b5236227e89c38012e5ff24fefa953643a7363ee98bac
                                                                        • Instruction Fuzzy Hash: EF917CB0300605AFCB19EB74C495AAE73A3BFC5618F108979E4569B3A0DF35EC46CB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0815c7cca971519b048b1da389264e4ab26db122c5ca2eb2a80bb1dcfb0eda26
                                                                        • Instruction ID: 44cd4c536caff34d1599cec7f5fafd0f0d55b1e9a43c862d5761f6e0d7526830
                                                                        • Opcode Fuzzy Hash: 0815c7cca971519b048b1da389264e4ab26db122c5ca2eb2a80bb1dcfb0eda26
                                                                        • Instruction Fuzzy Hash: 5571C2B1600205AFDB24AB65C49A7EEB7E6FFC4300F14893AE506977A0DF359C46CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4d053bd9805809929a3b7c953c640972296b015f37e5f9648b9f2ab5608e7ef9
                                                                        • Instruction ID: f2f16c2ae3aafca7b8b54a3ffff587a2369a44337e47853c23cde005f49b7130
                                                                        • Opcode Fuzzy Hash: 4d053bd9805809929a3b7c953c640972296b015f37e5f9648b9f2ab5608e7ef9
                                                                        • Instruction Fuzzy Hash: C991C6B5A0060AAFDB15CFA8C880ADEB7F2FF48310F14852AE92997351D770E955CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1337a4f55226cd564f0e20cf44367c751b60dc50504acaa61ab84fe6eae92d79
                                                                        • Instruction ID: c8524adb6839a8b8ec7646afb2b7f308828cd546c7c3c23f74a780a52b753151
                                                                        • Opcode Fuzzy Hash: 1337a4f55226cd564f0e20cf44367c751b60dc50504acaa61ab84fe6eae92d79
                                                                        • Instruction Fuzzy Hash: 8D619075B10219AFCB04CF64D454AEE7BF6FF88611F18446AE802AB391DB31EC45CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ae0a3d27c11b60b8ac94558da3b08207899291cd7fb0cce62d75d084aea6f2f1
                                                                        • Instruction ID: c7899a57db58e83ce39a052e4484156311fc4846cd17bab5aa0c1fa0246a001c
                                                                        • Opcode Fuzzy Hash: ae0a3d27c11b60b8ac94558da3b08207899291cd7fb0cce62d75d084aea6f2f1
                                                                        • Instruction Fuzzy Hash: C781E874A00349CFCB04EFA8C59899DBBB1FF49304F1589A9D8099F36ADB76E945CB40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5343e18c612d0a9211174ac9a1b5f5a289f24bd3af9d10cf1fee076a03c241ae
                                                                        • Instruction ID: 8bc47f5488e0912c93954a5065e1056da4f1ebb5870665bcd095c92fbfce6932
                                                                        • Opcode Fuzzy Hash: 5343e18c612d0a9211174ac9a1b5f5a289f24bd3af9d10cf1fee076a03c241ae
                                                                        • Instruction Fuzzy Hash: 79812774604345CFCB09EFA8C488A9DBBB2FF45304F1589A9D8059F36ADB76E985CB40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bced68feaa5dcd7c337dab5d0b8358bf20f14083c5eb7d4c5cc141a3754a7533
                                                                        • Instruction ID: 36a54a4a755444de24c49befd740f26466fd3135973b48f1378a915cfe87ecb6
                                                                        • Opcode Fuzzy Hash: bced68feaa5dcd7c337dab5d0b8358bf20f14083c5eb7d4c5cc141a3754a7533
                                                                        • Instruction Fuzzy Hash: 4B5181B5601612EFC708EF68C0908ADB7B2FF86714B6181BDD4168B351DB36EC02CB92
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e46ce4fedf103cb4d9374171e0ac4d33f2e241f2f98bf32041e8d8aa60d0f73e
                                                                        • Instruction ID: 87d57bd75bdeb1a7a38f4e714e62bc0becb318bc2dd43c78c16ef7f5fb5bfa7d
                                                                        • Opcode Fuzzy Hash: e46ce4fedf103cb4d9374171e0ac4d33f2e241f2f98bf32041e8d8aa60d0f73e
                                                                        • Instruction Fuzzy Hash: 78512F75A1060A9FCB00DFA8C8948EDF7B5FF89310B109669E406FB314EB30E985CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 456484caa2967f257ac1395653c09cbf8d5d17b10d42a64be85adb144b5042e0
                                                                        • Instruction ID: 8363af510efb3f268d4a03a21f5a0049e15deabbe8f2bbf58132aad27a6959cf
                                                                        • Opcode Fuzzy Hash: 456484caa2967f257ac1395653c09cbf8d5d17b10d42a64be85adb144b5042e0
                                                                        • Instruction Fuzzy Hash: 5941DDB1701345AFCB18EF24D914AEEBBF2BF89200F24857AE809DB655CB35D901CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3f7021bdffdcb6a538fb96b6b28badd8d7b5d2fb2cfc325e4d4c39fd7a9aeab8
                                                                        • Instruction ID: c28b07cd31056065001f8246ecfde236b8a2416cd0dda73875a96dbd9a5246cf
                                                                        • Opcode Fuzzy Hash: 3f7021bdffdcb6a538fb96b6b28badd8d7b5d2fb2cfc325e4d4c39fd7a9aeab8
                                                                        • Instruction Fuzzy Hash: 6141AEB5B04217EFEB11DF68D8949AEBBB9FB85610F0980BAD501CB351DB30E845C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e503252b7ff93035d6380bebe62d767d9549a599049c7d64c00c6b99cdaaeca3
                                                                        • Instruction ID: ebe90dd837a54ed424ddb08b54e9815f8e095bb2eeb8987aaa8619a25e56d920
                                                                        • Opcode Fuzzy Hash: e503252b7ff93035d6380bebe62d767d9549a599049c7d64c00c6b99cdaaeca3
                                                                        • Instruction Fuzzy Hash: 92417EB5B01746EBCB18AF64E954AEEB7B2FF88200F10443AD40697654DB35D941CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4cb45580faa97bdcadd7c87798e1dfe2cb1fd7a188254e2779272ae3b5c099dd
                                                                        • Instruction ID: 22b9eb8a6e9823d3b71e4d901163cbc5ac6c252590e63af8fef5ee2faf090001
                                                                        • Opcode Fuzzy Hash: 4cb45580faa97bdcadd7c87798e1dfe2cb1fd7a188254e2779272ae3b5c099dd
                                                                        • Instruction Fuzzy Hash: 2141CFB1700541AFDB29AB78C454AEE72E2BBC9714F04447ED40ACB791DF78AC06C792
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cea8d63fc581ad61aa76d3b31648ce503a1db51f83b91ac7ca3c73906d95eebb
                                                                        • Instruction ID: 838e8b54acbef63de508fbe45d20128b0006d55530e5a631e710052fff6b255a
                                                                        • Opcode Fuzzy Hash: cea8d63fc581ad61aa76d3b31648ce503a1db51f83b91ac7ca3c73906d95eebb
                                                                        • Instruction Fuzzy Hash: 2941A2B5A01602EFC708EF68C0919ADB7F2FF85714B5181B9D4169B361DB36EC42CB92
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31713b3a8dd4e76a72baa9477a32accede79d7dc185c087dc919458cd5df5be0
                                                                        • Instruction ID: b24dda97d2fab1380fbd41d5e38f5e7a3830e08aa2013e43510c1c36ea887da2
                                                                        • Opcode Fuzzy Hash: 31713b3a8dd4e76a72baa9477a32accede79d7dc185c087dc919458cd5df5be0
                                                                        • Instruction Fuzzy Hash: 92418335A10609DFCB00EFA8D8848EDF7B5FF89314F00826AE515AB321EF71A945CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 08b32ab44cf8ef231245b3cea21abd1b02bbb0efc7ab4dc5018e75aecfce14bb
                                                                        • Instruction ID: f5361c916c38c7a7dee286f0ade61411f70ba4bf929ff312d5265bb66f278d8c
                                                                        • Opcode Fuzzy Hash: 08b32ab44cf8ef231245b3cea21abd1b02bbb0efc7ab4dc5018e75aecfce14bb
                                                                        • Instruction Fuzzy Hash: FD317AB2F10219EFCB14EFA8E8544DDBBF6FF89210F10892AE405A7764DB719845CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ce94ac8412631e5f17d72140b6a29967f881ece3ced3d7a6aa208e8ae69b4481
                                                                        • Instruction ID: 67d8f550598c2e9f194f01773eba284e5ad68915479fb01673f09512f9579fd6
                                                                        • Opcode Fuzzy Hash: ce94ac8412631e5f17d72140b6a29967f881ece3ced3d7a6aa208e8ae69b4481
                                                                        • Instruction Fuzzy Hash: 3431E1B0D093819FD756DB68C4106EEBBF1AF46204B0984ABC444DB7A2D738D802CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c04c0809d418efb79ed32e9d44b7fe72cd3f373f392ea7e69ede277f8468d35a
                                                                        • Instruction ID: e93f68d4f9aa8110e695bf3b56ee4b7f5a33a00c1a8bc5e1acb129e380d52dc8
                                                                        • Opcode Fuzzy Hash: c04c0809d418efb79ed32e9d44b7fe72cd3f373f392ea7e69ede277f8468d35a
                                                                        • Instruction Fuzzy Hash: 2721F170A04208BFD700AB74DC41BEE7BB6EF8A740F108066E506DB291DB396D0A87A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 84aefd84aa48ad1a8a44df356f867b4b76a5f78d846efeeb0cbc5ed1843cab0a
                                                                        • Instruction ID: 8eac0f3bed307bd29eecb57bde67d3e7a319f72bdc4b2be976bb3dd2072dabf7
                                                                        • Opcode Fuzzy Hash: 84aefd84aa48ad1a8a44df356f867b4b76a5f78d846efeeb0cbc5ed1843cab0a
                                                                        • Instruction Fuzzy Hash: 532101B6B102119FDB248A25C9915BFB7E6FFD4318B28C47ED24693790CA34ED40C761
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd731f7a01b161678a2e0248e353348d2292430d26875ec13fadca45bf513cdf
                                                                        • Instruction ID: 46b55015badf10b1738138ba9ffcb428992f4613d637eeac72a6e3517b00147f
                                                                        • Opcode Fuzzy Hash: cd731f7a01b161678a2e0248e353348d2292430d26875ec13fadca45bf513cdf
                                                                        • Instruction Fuzzy Hash: BA312135A10609DFCB05EFA8C894CDDBBB5FF89310F018659E5057B224FB70AA89CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a68c6db323360f8c2d1d56c292a94ca7022e112cae1e1ae5a14ebe827b1a77ff
                                                                        • Instruction ID: 7accb7a7945c62c0c33ef6594d54484328b0a73b86e3c1ba430ad1d0ef9f02e4
                                                                        • Opcode Fuzzy Hash: a68c6db323360f8c2d1d56c292a94ca7022e112cae1e1ae5a14ebe827b1a77ff
                                                                        • Instruction Fuzzy Hash: 8C219F74700106AFCF109FA4F88A6AEBBF4FF88341F04496AE509D7291EB70D905CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8192c5bb13584a8c0cb9a648a416055aa5f54eb2931b3a88e2c3837e81c3a4b2
                                                                        • Instruction ID: 7eef959ae2b4bedfc3d4d384c717248c0dcad5dd29a3b53e997d94cd557506ea
                                                                        • Opcode Fuzzy Hash: 8192c5bb13584a8c0cb9a648a416055aa5f54eb2931b3a88e2c3837e81c3a4b2
                                                                        • Instruction Fuzzy Hash: F8212871504240DFDB00EF10D9C0F66BFA5FB94324F28C5AAE8050B7A6C336E855D7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e556285977e6cde6946bdf9c4f4eae42ce257d0d5d70bb6060bc8accec85d38b
                                                                        • Instruction ID: 81323b3aef95479dbdb6c163ccf548411c7b15fcd0d0471cf6ca987ecd68e65e
                                                                        • Opcode Fuzzy Hash: e556285977e6cde6946bdf9c4f4eae42ce257d0d5d70bb6060bc8accec85d38b
                                                                        • Instruction Fuzzy Hash: BF213A71504240DFDB00EF10D9C0BA7BFA5FBA8328F2485ABE8050B7A6C336D845C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 34520c32501883ba2fccbbd8982e92101a6959abf030254dea46bc66c5157e99
                                                                        • Instruction ID: 66343d0fa23838de5f252c01ed59c71375579f40c751747ef8b7c89435a1a82e
                                                                        • Opcode Fuzzy Hash: 34520c32501883ba2fccbbd8982e92101a6959abf030254dea46bc66c5157e99
                                                                        • Instruction Fuzzy Hash: 7B21AEB0F0020ADFCB54EF64C895AAEB7B1FFC9300F1084799515A73A0DA749D42CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265593969.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b9d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 33f665ac867e0fad6546b0784fdda458e898ac3e6b25d44771b5eebc96b79981
                                                                        • Instruction ID: d350fdb80f718830161e64ad10c4bf8cfac33d4e43236b128627860420707799
                                                                        • Opcode Fuzzy Hash: 33f665ac867e0fad6546b0784fdda458e898ac3e6b25d44771b5eebc96b79981
                                                                        • Instruction Fuzzy Hash: 86212275604240DFDF14CF20D8D0B26BBA1FB84324F20CAB9D80A4B746C33AD806CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265593969.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b9d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1370a93970763b55e1a10b8dfc1f9bd2aecb0d1bd560017d8436a5406b64071b
                                                                        • Instruction ID: 1b40cad82f8bec9c0a949e2776ee59d36b7c9a6f4ac8e6f558486874e4cc7ffb
                                                                        • Opcode Fuzzy Hash: 1370a93970763b55e1a10b8dfc1f9bd2aecb0d1bd560017d8436a5406b64071b
                                                                        • Instruction Fuzzy Hash: DF21C275604240EFDF05DF11D9C0B26BBA5FB84314F24CABDE8494B796C336D846CA61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 75fcbc3245b12114400be567b491cace6ac07deb805ab7c3bc5c2f0307be49ae
                                                                        • Instruction ID: 6dee2f74d3fb39714d95a3debff39076039efdf07acffa18c990a0ebfaf72f4a
                                                                        • Opcode Fuzzy Hash: 75fcbc3245b12114400be567b491cace6ac07deb805ab7c3bc5c2f0307be49ae
                                                                        • Instruction Fuzzy Hash: F6212F75A106099FCB10EF6CD84059EFBB5FF49310B50C26AE958A7200FB31A998CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d44bbac5dc8e55ed2469ae09d025bcb6bd9d5baa2c766abc5beaa36ce83b78bb
                                                                        • Instruction ID: 3c142417bb83d6159fecfd0dd1e75e7e27311d33da5a9b6f4ee1377cb2e8f454
                                                                        • Opcode Fuzzy Hash: d44bbac5dc8e55ed2469ae09d025bcb6bd9d5baa2c766abc5beaa36ce83b78bb
                                                                        • Instruction Fuzzy Hash: A7212875A00209EFCF04DFA4E845ADDBBF1FB48321F14546AE901B72A0C732AD55DBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31ffb727e8e6d158f5e69dddd49d1a88dcfc934d378edf7bba315098da81215b
                                                                        • Instruction ID: 31b532f27157e5bbb92bab69ffc8e0055d385c2192c7ce178825a6ed65c5f885
                                                                        • Opcode Fuzzy Hash: 31ffb727e8e6d158f5e69dddd49d1a88dcfc934d378edf7bba315098da81215b
                                                                        • Instruction Fuzzy Hash: 712119B4E102199FDB04DFA9D884AEEBBB2FB89301F10842AD915B3354DB745915CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aff0b191e5bae5a5db93976155f64b3c3751c688c81d835db06fad052d7de4d8
                                                                        • Instruction ID: a7394eea8128f669d8998fe38180291d548506fee40852a82e6137c934535775
                                                                        • Opcode Fuzzy Hash: aff0b191e5bae5a5db93976155f64b3c3751c688c81d835db06fad052d7de4d8
                                                                        • Instruction Fuzzy Hash: 4321BDB5D0034AAFDB10CF9AD884ADEFBF4FB48224F14842AE915A3250D374E945CFA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265593969.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b9d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 901412f065508f87b41464a589d1da92ec11cc7386f8b23ee38ddc01c02e8e8c
                                                                        • Instruction ID: 20834db45a16d52130f5355cf11a0a9267e59d6ca89ef57778643071921c308c
                                                                        • Opcode Fuzzy Hash: 901412f065508f87b41464a589d1da92ec11cc7386f8b23ee38ddc01c02e8e8c
                                                                        • Instruction Fuzzy Hash: 3721C9755093808FCB02CF20D5A0715BF71EB45314F28C5EAD8458B657C33AD80ACB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 71591a689a2965ebd0c015345a4e314d158c2d7921d5b405ceb303184406c818
                                                                        • Instruction ID: 3e32d99d15a2d3ea992528e38a8680fc9a7ac9be73435096ab86b0e6e89b4c8f
                                                                        • Opcode Fuzzy Hash: 71591a689a2965ebd0c015345a4e314d158c2d7921d5b405ceb303184406c818
                                                                        • Instruction Fuzzy Hash: 9E1156B0E0120ADFCB59DF69C444AAEF7F1BF49314F1484BA9418AB361D738E902CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd16ec5f07b90e36420dbdc17a37adbe6bd9fa48a30af9fba116c254855879ce
                                                                        • Instruction ID: fd30d27203b87226d4011d22ae9c3a4218fa1c8d815f715f8b7353992308ac3f
                                                                        • Opcode Fuzzy Hash: fd16ec5f07b90e36420dbdc17a37adbe6bd9fa48a30af9fba116c254855879ce
                                                                        • Instruction Fuzzy Hash: 20117F747001419FDF10EF94E9966AE7BE4FF88740F04487AE8099B391EB70D905C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                                        • Instruction ID: b4b897ec3f455c66d4dba67077326eacf58e81eb5f4524bc36e092fe2ecb53bb
                                                                        • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                                        • Instruction Fuzzy Hash: B8119376504280DFCB15DF10D9C4B16BFB1FB94324F28C6AAD8094B766C336E856CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                                        • Instruction ID: 5215626554fc79864eb2d2028a772e03ac44c7f63e0a85e50f71f2d7246fd508
                                                                        • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                                        • Instruction Fuzzy Hash: 2511D376504280DFCB01DF10D9C4B56BFB2FB94324F24C6AAD8050B666C336D956CBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 781d1b0591a25ec1a81bfea3e927b410b9233fd2b41b1d96086cbb986a3b6bbd
                                                                        • Instruction ID: 4009ab19151b3126860415ea822a0c8c5fb82a18e36a4484ac7fe3069b5db53c
                                                                        • Opcode Fuzzy Hash: 781d1b0591a25ec1a81bfea3e927b410b9233fd2b41b1d96086cbb986a3b6bbd
                                                                        • Instruction Fuzzy Hash: 760192B67516029FD7149A28C845EBD3397FBC5620F194976E416CB3A2CA24D8428651
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265593969.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b9d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e43bc81a3ff9705b917d63333e3be4ed1b9938392dd5ea36af53da639c8dcacc
                                                                        • Instruction ID: a750cac9577c9b1343622ac8c553cade8d0534f242d669e8498b71f985f29f2f
                                                                        • Opcode Fuzzy Hash: e43bc81a3ff9705b917d63333e3be4ed1b9938392dd5ea36af53da639c8dcacc
                                                                        • Instruction Fuzzy Hash: 57117975904280DFCB11CF10D5C4B15BBA1FB84324F28C6AAD8494B696C33AD84ACB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a84004bc94ad9fd6ebf1a2fea5677e31821bd9a66595e18153d3d2967d70bc1
                                                                        • Instruction ID: 032c55bbdb888375cac86b0bddc965375f67186597f27eed8dd7aa8066dd7dda
                                                                        • Opcode Fuzzy Hash: 8a84004bc94ad9fd6ebf1a2fea5677e31821bd9a66595e18153d3d2967d70bc1
                                                                        • Instruction Fuzzy Hash: 9B012875A04254AFC711EBA8DC948DEBFB5EF8221070141AFD5459B321E7305A49C7F2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 33b573dd95db0d28e7c63ac271ef94c3dbea75044686fb70d83932a5093f2c1a
                                                                        • Instruction ID: 0e0c175fb08d7f19b8279df7809687afaad8b1f4d062011a9008e59778097cc8
                                                                        • Opcode Fuzzy Hash: 33b573dd95db0d28e7c63ac271ef94c3dbea75044686fb70d83932a5093f2c1a
                                                                        • Instruction Fuzzy Hash: F001DF39508244AEE710AF11C8C0BA6FBE8EF41364F18849BED040AAE2C7799C48C7B1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 22471b38595ec04d141a6e995d5bde78cff8d9c8777e56b979f8a03967da4c64
                                                                        • Instruction ID: 0a8dc90e1e40ba6619bc5000d37009fb18aa8843775136cfbab3b35640739b7a
                                                                        • Opcode Fuzzy Hash: 22471b38595ec04d141a6e995d5bde78cff8d9c8777e56b979f8a03967da4c64
                                                                        • Instruction Fuzzy Hash: 2101C574210B05DFC710EB28D484BE9B3E5BF49204F148C6AE2AACBB79D771E8048B90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba35d0ddb89fb0baf577a3a646975f8bbe17b2e091a2ec0f3aac089d157e943a
                                                                        • Instruction ID: 6e1de29104ebaa19982091e3fccbca7ae938bdfd10b4acfbc738c1fe95008ce9
                                                                        • Opcode Fuzzy Hash: ba35d0ddb89fb0baf577a3a646975f8bbe17b2e091a2ec0f3aac089d157e943a
                                                                        • Instruction Fuzzy Hash: 72F062367003449BC354AF59E809A9ABBA5EFC5361F20C43BF9498B744CE318806DBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.265366587.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_b8d000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a576efffc4831921c58336c0e9746b83af73fa3b5208d7c73331ca5edb31f7e2
                                                                        • Instruction ID: 5ca22f97cbab66e69d4feb695e4e0e55b78b6cf28f0df694a526c0f39e0f2972
                                                                        • Opcode Fuzzy Hash: a576efffc4831921c58336c0e9746b83af73fa3b5208d7c73331ca5edb31f7e2
                                                                        • Instruction Fuzzy Hash: 14F0C2754042849EE7109E05CCC4B62FFE8EB41774F18C49AED080B692C3799C44CBB1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ebbd4dffe06d5810fc842573e07bc1a228c1158f005ab39b148686fab0564cb8
                                                                        • Instruction ID: 964d7544b1938bcd2cbed16ff508167ef5ce76f41c2065fd20c9b9bca1825474
                                                                        • Opcode Fuzzy Hash: ebbd4dffe06d5810fc842573e07bc1a228c1158f005ab39b148686fab0564cb8
                                                                        • Instruction Fuzzy Hash: 80E0D8B1F15622F78355173844112AEB1857F8AA68F104E7AA4059B794CA32CC4243C0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e3f0b8d87854eb0a61460a7ce504258a80cc699fe47afb8085850cb46b29cd32
                                                                        • Instruction ID: 61ebb726b34ce320fbac629229eceaa064c898cc04e63053371e4806faea0aec
                                                                        • Opcode Fuzzy Hash: e3f0b8d87854eb0a61460a7ce504258a80cc699fe47afb8085850cb46b29cd32
                                                                        • Instruction Fuzzy Hash: 9AF01C71A152489FD741CF64E8447CCBBF0FB05214F1182E7D844D7261D7364641CF00
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5e54d49cec64e912519ab55d9088f27d2bdd8f5f46aa9e7135b2290dbe7111b7
                                                                        • Instruction ID: ed0d7e686c2e57a1acfc4ac2a68f5fe101a8042f4b16a07bc644cf2c3cd3316d
                                                                        • Opcode Fuzzy Hash: 5e54d49cec64e912519ab55d9088f27d2bdd8f5f46aa9e7135b2290dbe7111b7
                                                                        • Instruction Fuzzy Hash: 8AF058B1600B019FC328CF0AD894AAABBF0FF44715B14C86FD84E87A65CA30F841CB10
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b67d10ec0b75a1df980e8e229561b1571fa5126a54883ea0e8c0628633439747
                                                                        • Instruction ID: c57030d19b8736417a0df90ba3445bdee1a821853ecf66e1fae65cb6eb8e6f46
                                                                        • Opcode Fuzzy Hash: b67d10ec0b75a1df980e8e229561b1571fa5126a54883ea0e8c0628633439747
                                                                        • Instruction Fuzzy Hash: A7E0DF75C10108AFD744EBE4E849BDDBBF0EB04218F1002BAC804E7340EB309A868782
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 879b3199214ad7523762ac3fb22970083a46b6da160d57c8f7744d9804e62a9e
                                                                        • Instruction ID: 1961f121bc7156c874c2982a2ee4fa5826b27d6340fe24847a7a5fde283fc956
                                                                        • Opcode Fuzzy Hash: 879b3199214ad7523762ac3fb22970083a46b6da160d57c8f7744d9804e62a9e
                                                                        • Instruction Fuzzy Hash: 17F030709143489FC740EFA8E855A9DBBB4FF45309F1181EAD804D7361D735D905CB52
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f75d3400a0226c2ff5437d12f6103b88d944ebe73a37a481f37ce9ec3e424e82
                                                                        • Instruction ID: 44b82aa01aad5726b6daa35f84360e44b5b863bd62da70e131b37b96cb9fff55
                                                                        • Opcode Fuzzy Hash: f75d3400a0226c2ff5437d12f6103b88d944ebe73a37a481f37ce9ec3e424e82
                                                                        • Instruction Fuzzy Hash: B7D02E2B30012413C320201FA8803EB62CF8BC5922E08803FE406D3340DD2A880641E5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d384285764753022c2f5e8e26f7f59caeedd21cbe369c7662dacc920cb64ee34
                                                                        • Instruction ID: 3792a39e66d9badc4ace7a5a5cc69dad9b85c08c464c4b68e3ac7a3243fd13b1
                                                                        • Opcode Fuzzy Hash: d384285764753022c2f5e8e26f7f59caeedd21cbe369c7662dacc920cb64ee34
                                                                        • Instruction Fuzzy Hash: CDE092B0D14208AFD700DFA8E44579D7BB5FB09709F0140E6D404A3351D731DA08CA40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 37e985588031ed49c8e9d17f0e8a8e1ac966a62c2d840621ae58d9c5e2b648ce
                                                                        • Instruction ID: b0d6ddc63999b7ff0a0e303b0ce4f137473f47c47d6c59cb17ef3ee8b9dc7921
                                                                        • Opcode Fuzzy Hash: 37e985588031ed49c8e9d17f0e8a8e1ac966a62c2d840621ae58d9c5e2b648ce
                                                                        • Instruction Fuzzy Hash: 3FE0C974D0021DAFCB44EFA8D845AADBBB0FB48311F0086AAE815A3310D7715650DB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e5ffa5459fad0a99ba91130abceafbb7f75557ee500176a1b86b50b57e781df7
                                                                        • Instruction ID: c7f1e3a4669d8569875a5579bc90d2e2b05d065b217e3496e313bfbe9f1df33d
                                                                        • Opcode Fuzzy Hash: e5ffa5459fad0a99ba91130abceafbb7f75557ee500176a1b86b50b57e781df7
                                                                        • Instruction Fuzzy Hash: BDD0A736759224B34608726D54544DF72DEBFC65257444D3BE509C3F20DEA49D0941E3
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 627717fae440298a332bbf9f2ed265b34bbfb60928bb044bcd082fe7c3423e47
                                                                        • Instruction ID: f55beccc755dfe5e702148024093b5a64b904a06860e5c7e4beae9e20af0d6e4
                                                                        • Opcode Fuzzy Hash: 627717fae440298a332bbf9f2ed265b34bbfb60928bb044bcd082fe7c3423e47
                                                                        • Instruction Fuzzy Hash: 3FE0C9B4D0021CAFCB44EFE8D904AAEBFB4FB48310F0086AAE854A3314D7715650DF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 83e44fa4e352017c414166323444d865dc118d95451c3fe620a14b8cf4538c4f
                                                                        • Instruction ID: c4e36ee6340288fbae9bf023e3e857c9cbf2cc44ec495f1e53e688b68e9eea66
                                                                        • Opcode Fuzzy Hash: 83e44fa4e352017c414166323444d865dc118d95451c3fe620a14b8cf4538c4f
                                                                        • Instruction Fuzzy Hash: 49E0B674E14208AFC744EFA8E444A9DBBB4FB49305F1181EAD80897360D7319A41CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d5bcb4bcac25841fc8fe1b5a2f71677d6dda038283f790162c1fadbba2642fa3
                                                                        • Instruction ID: 7f63589d81f04259057e6e45547cdb1f021fbc206d57c5c6abf49a7deddb67d2
                                                                        • Opcode Fuzzy Hash: d5bcb4bcac25841fc8fe1b5a2f71677d6dda038283f790162c1fadbba2642fa3
                                                                        • Instruction Fuzzy Hash: 34E09274E20208AFCB80EFA9D448A9DBBF4FB08615F0081EAD808D7360E7359A40CF41
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 09311e3d5884059f8b756250e8333585751efa2eb999c40d82f8f729dd37d176
                                                                        • Instruction ID: 6626cd8674d6a4c069563e261db42555b3ddb90bc3c4367a1b777a7628ab5e15
                                                                        • Opcode Fuzzy Hash: 09311e3d5884059f8b756250e8333585751efa2eb999c40d82f8f729dd37d176
                                                                        • Instruction Fuzzy Hash: 7EE09274E11208EFCB40DFA9D545A9DBBF4FB08615F0081EAD909D7360E7359A50CF41
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd5b6bc2bf0b4bd2c817068a6a7277d8c17677ecd8a0713eaf140b2eaeb92ffc
                                                                        • Instruction ID: 9a0675f6d6280648c2bd530f52a03828b20da392a8471d086f88c5ae62189848
                                                                        • Opcode Fuzzy Hash: fd5b6bc2bf0b4bd2c817068a6a7277d8c17677ecd8a0713eaf140b2eaeb92ffc
                                                                        • Instruction Fuzzy Hash: 1EE046B0D14208AFCB04DFA8E508A9DBBF4FF4A305F0081EAE80893360D7309A00CF51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eda6ea421e11df3b5477fe641d5a41dbb2ec37e42f42c7bd754bd4f9ef2c30f9
                                                                        • Instruction ID: 3668587159e46889c3e238dcc83f580e255a3bcabbd734675bc2b78110eed55a
                                                                        • Opcode Fuzzy Hash: eda6ea421e11df3b5477fe641d5a41dbb2ec37e42f42c7bd754bd4f9ef2c30f9
                                                                        • Instruction Fuzzy Hash: EEE08C70D00208AFC704EFF8E408B9CBBF4EB04218F5001FAC904A7340EB309A86C781
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4374dfee6b14bd1de612ed33cad0ee82684199e98caed67a75c4076dc8062472
                                                                        • Instruction ID: 15ae12385be0b1d11bda651a9deab5f930b6d4d6e4965e1170cd7ae12fc5b1a2
                                                                        • Opcode Fuzzy Hash: 4374dfee6b14bd1de612ed33cad0ee82684199e98caed67a75c4076dc8062472
                                                                        • Instruction Fuzzy Hash: 9DE01270D15208EFC754EFB4E50569DB7B5FB84305F1081FAC80893340D7359A41CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fc8aa3a6e6302521d4047d3d3e4698357de93797917021330538e4f45a968eca
                                                                        • Instruction ID: 073e382ef30c76357de319b2bd196cd3a56e791a3a8bc88ca2f4342757cec993
                                                                        • Opcode Fuzzy Hash: fc8aa3a6e6302521d4047d3d3e4698357de93797917021330538e4f45a968eca
                                                                        • Instruction Fuzzy Hash: 58E0EC70D05218ABC754EFB4A5146ADBBB5BB89305F1081FAD45863240DB359A41DB51
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7a932b7e1ae6b5c55a443cf2c77c347e5507b3759fa3a474e1685dd693adb395
                                                                        • Instruction ID: c795eefb4bc56886532b093bde4e985ca3fc534ce2c001dd2e8e07dc56c5507d
                                                                        • Opcode Fuzzy Hash: 7a932b7e1ae6b5c55a443cf2c77c347e5507b3759fa3a474e1685dd693adb395
                                                                        • Instruction Fuzzy Hash: CBC0807F704538134625306F24444FFA6DF4FC5961705457FE50A83344DD759C1181E5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a26f3b950fa981a589757c86fd705870d469969d48c3599458f8f1bcba58805
                                                                        • Instruction ID: 23204089e365a652d1558d8549dd797fb56b761d56eda44337cbd9ed09f5feeb
                                                                        • Opcode Fuzzy Hash: 2a26f3b950fa981a589757c86fd705870d469969d48c3599458f8f1bcba58805
                                                                        • Instruction Fuzzy Hash: 17E0ECB0D05218EFC755EFB8A50569DBBF4BB85305F1082FAD85853244D7358A41DB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91aa28ab4a83a78a00a924a512ba1646f0f643f97ac41f83eadcd554aa5a938a
                                                                        • Instruction ID: 47b1af28dff5d4afc070fa6e5f962426c21a7b336745238d485cc2f7498c3302
                                                                        • Opcode Fuzzy Hash: 91aa28ab4a83a78a00a924a512ba1646f0f643f97ac41f83eadcd554aa5a938a
                                                                        • Instruction Fuzzy Hash: 7CE0EC70D05208EFC754EFB8E54569DB7B5FB44305F1081BEC81493240D7759A41CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5ef11580ca31bcf0877ff8153914ec523bbb5cd52ccb45a7311cdea306b8d0d4
                                                                        • Instruction ID: 2a107bd158de3d1e220d21f6e2325578475ee86f9d9b9697a9d8d3ad927c7bb3
                                                                        • Opcode Fuzzy Hash: 5ef11580ca31bcf0877ff8153914ec523bbb5cd52ccb45a7311cdea306b8d0d4
                                                                        • Instruction Fuzzy Hash: 91E0EC728002ADBBCF119E459844BDA7F69EF01664F544066FA582F011C773A86297E1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: afba7e767d207b39acb92ef8aff0ab325ca3717806bfb04ef362d05810ccedcc
                                                                        • Instruction ID: bf8b8345a54af84b2cbac2adb2cec12c5f03e8040e7a82c03fb34d0063fd9527
                                                                        • Opcode Fuzzy Hash: afba7e767d207b39acb92ef8aff0ab325ca3717806bfb04ef362d05810ccedcc
                                                                        • Instruction Fuzzy Hash: 6FE0E27191070CAE8B40FF78D9484AE7BF8BB15210F80C53AE9099A500FA30D2999B81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c4885a03a744d391f0775f6883faf80312914a60c1f9fd04a859020648df92b4
                                                                        • Instruction ID: 42e9ff5d3097b2f9300c2b83f3ecb5ed05d24e2236bb184475b7a26441698e19
                                                                        • Opcode Fuzzy Hash: c4885a03a744d391f0775f6883faf80312914a60c1f9fd04a859020648df92b4
                                                                        • Instruction Fuzzy Hash: D2D05E70921208AFC704EFB4A40475D7BB4BB04205F5001BEC80453240EB318A55C691
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cdd1e09ffac0f0ecc6f3eb8f9f7e4fd6c67f08d102cefd9ec0a10e9addfe6af1
                                                                        • Instruction ID: 534681822c128c215f1d4246d9bd47f06cc7a21252208f9c22b254aaf9a2b300
                                                                        • Opcode Fuzzy Hash: cdd1e09ffac0f0ecc6f3eb8f9f7e4fd6c67f08d102cefd9ec0a10e9addfe6af1
                                                                        • Instruction Fuzzy Hash: 6ED0C934280108EFC780AF14C444CAA7BA6FF29361B108861F9484B731C631E811CA91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ea06589af9cfc1717168955921bffe86c12e613ad7c866706c2f0114ac3425ce
                                                                        • Instruction ID: 93ded99ded0dfb91ecdaed999fde6ba1a2668f077a22fa1c906666586a6e6cf8
                                                                        • Opcode Fuzzy Hash: ea06589af9cfc1717168955921bffe86c12e613ad7c866706c2f0114ac3425ce
                                                                        • Instruction Fuzzy Hash: C0C09B3232453417D608319DF4165ED76CDD789665F54007BE50EC37415DFA5D4103DE
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a949b7d61440836ce0a13a58e8ad281a4ea43f29abd2614299a5d8055409cea7
                                                                        • Instruction ID: 1ae0fd301154605b9f731882537e4c36cd1dc43ff4e2416cfccac09692755c38
                                                                        • Opcode Fuzzy Hash: a949b7d61440836ce0a13a58e8ad281a4ea43f29abd2614299a5d8055409cea7
                                                                        • Instruction Fuzzy Hash: 54B09B2173413813D508319D74135ED718D97C5965F40007B950D877415DD65D4102DE
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 998888144036a2573afa5a7002754ab579468daa4ce0ede6fe25cf38b674c823
                                                                        • Instruction ID: 13fd9ed7b8953ef6c63d2438a4fb6b818fb818feea99dcba055b399acf237513
                                                                        • Opcode Fuzzy Hash: 998888144036a2573afa5a7002754ab579468daa4ce0ede6fe25cf38b674c823
                                                                        • Instruction Fuzzy Hash: E6D01224C0D7C18FC7229B3489264DAFFA0BEB3200B09D3EF85C04A042DA5A04D5C762
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e9563d5f725b2c825a036154db0efa307fd9ee4b7727b11efd907608115fb21
                                                                        • Instruction ID: 8108f70d4c5f97d15bfad853dc8fdeff4f9487b87165dc70a6abace389aa508e
                                                                        • Opcode Fuzzy Hash: 8e9563d5f725b2c825a036154db0efa307fd9ee4b7727b11efd907608115fb21
                                                                        • Instruction Fuzzy Hash: 05C0926B0A4101AAE6682190994BBDA7601ABD1B24F04502AE60959E92D06290A1A5AB
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a009157cc8cbf89a1e4868aba923bc0def270f8eef51efcaa74b69639efa00f
                                                                        • Instruction ID: 64462bdbbbe530cc2da2fa1efe5c8961eee029f5fc62af3b0c7c99b4d8e31b79
                                                                        • Opcode Fuzzy Hash: 8a009157cc8cbf89a1e4868aba923bc0def270f8eef51efcaa74b69639efa00f
                                                                        • Instruction Fuzzy Hash: 1CB012BE298102FEE20437500411FDEF001BFD1B1CF009C263706186608962D420D1BB
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.276782234.00000000075A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075A0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_75a0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @u1t
                                                                        • API String ID: 0-2036309773
                                                                        • Opcode ID: caa5a5e133ea13a581a522d1c34a688c253055b856da62c9bb7a5431ae465fab
                                                                        • Instruction ID: 649eeda047c232f73d6037a67393109c80025280e6f4defabba829225a9227f0
                                                                        • Opcode Fuzzy Hash: caa5a5e133ea13a581a522d1c34a688c253055b856da62c9bb7a5431ae465fab
                                                                        • Instruction Fuzzy Hash: BA919CF0E00216AFCF19CF69C5806AEBBB2BF89200F15C4BAC8156B751D731E941CBA5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.266716584.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_29d0000_s0VxndYXq0.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 33576d7907a0b4994557f93b2c3955155e005edb5aad01e4131c3c539e693ecf
                                                                        • Instruction ID: 083c2028f12a03698f71f5fda1cc0454a729a0ef5679abdaf0dadb6111758ead
                                                                        • Opcode Fuzzy Hash: 33576d7907a0b4994557f93b2c3955155e005edb5aad01e4131c3c539e693ecf
                                                                        • Instruction Fuzzy Hash: 57A17A32E00209CFCF05DFB5C8445EEBBB6FF88304B15856AE906AB225EB34A955DF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Execution Graph

                                                                        Execution Coverage:11%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:88
                                                                        Total number of Limit Nodes:5
                                                                        execution_graph 28120 f843f8 28121 f8440f 28120->28121 28125 f844b8 28121->28125 28130 f844a8 28121->28130 28122 f84420 28126 f844ca 28125->28126 28127 f844d5 28126->28127 28135 f845a0 28126->28135 28141 f845d7 28126->28141 28127->28122 28131 f844ac 28130->28131 28132 f844d5 28131->28132 28133 f845a0 CreateActCtxA 28131->28133 28134 f845d7 CreateActCtxA 28131->28134 28132->28122 28133->28132 28134->28132 28137 f845a4 28135->28137 28136 f84591 28136->28127 28137->28136 28147 f846a0 28137->28147 28151 f84690 28137->28151 28142 f845c9 28141->28142 28144 f845e7 28142->28144 28145 f846a0 CreateActCtxA 28142->28145 28146 f84690 CreateActCtxA 28142->28146 28143 f845cf 28143->28127 28144->28127 28145->28143 28146->28143 28148 f846c7 28147->28148 28149 f847a4 28148->28149 28155 f84338 28148->28155 28153 f84698 28151->28153 28152 f847a4 28152->28152 28153->28152 28154 f84338 CreateActCtxA 28153->28154 28154->28152 28156 f85b30 CreateActCtxA 28155->28156 28158 f85bf3 28156->28158 28177 f8b638 28180 f8b723 28177->28180 28178 f8b647 28181 f8b72c 28180->28181 28182 f8b75b 28181->28182 28188 f8b9b8 28181->28188 28194 f8b9a8 28181->28194 28182->28178 28183 f8b958 GetModuleHandleW 28185 f8b985 28183->28185 28184 f8b753 28184->28182 28184->28183 28185->28178 28189 f8b9bc 28188->28189 28192 f8b9f1 28189->28192 28200 f8b1ac 28189->28200 28192->28184 28195 f8b9ac 28194->28195 28196 f8b1ac LoadLibraryExW 28195->28196 28199 f8b9f1 28195->28199 28197 f8b9df 28196->28197 28198 f8b1b8 LoadLibraryExW 28197->28198 28197->28199 28198->28199 28199->28184 28201 f8ba18 LoadLibraryExW 28200->28201 28203 f8b9df 28201->28203 28203->28192 28204 f8b1b8 28203->28204 28205 f8bb98 LoadLibraryExW 28204->28205 28207 f8bc11 28205->28207 28207->28192 28165 adc0948 28166 adc0993 ReadProcessMemory 28165->28166 28168 adc09d7 28166->28168 28208 adc0818 28209 adc081e WriteProcessMemory 28208->28209 28211 adc08b7 28209->28211 28212 adc0718 28213 adc0758 VirtualAllocEx 28212->28213 28215 adc0795 28213->28215 28226 adcba88 28227 adcba9d 28226->28227 28231 adc044b 28227->28231 28235 adc0450 28227->28235 28228 adcbab0 28232 adc0490 ResumeThread 28231->28232 28234 adc04c1 28232->28234 28234->28228 28236 adc0490 ResumeThread 28235->28236 28238 adc04c1 28236->28238 28238->28228 28216 f8da30 28217 f8da96 28216->28217 28220 f8dbf0 28217->28220 28223 f8d7a4 28220->28223 28224 f8dc58 DuplicateHandle 28223->28224 28225 f8db45 28224->28225 28159 adcbad0 28160 adcbc5b 28159->28160 28161 adcbaf6 28159->28161 28161->28160 28163 adcbd50 PostMessageW 28161->28163 28164 adcbdbc 28163->28164 28164->28161 28169 adc0540 28170 adc0585 SetThreadContext 28169->28170 28172 adc05cd 28170->28172 28173 adc0b60 28174 adc0be9 CreateProcessA 28173->28174 28176 adc0dab 28174->28176 28176->28176

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 aee7aa0-aee7ac1 1 aee7ac8-aee7bbc 0->1 2 aee7ac3 0->2 4 aee82c4-aee82ec 1->4 5 aee7bc2-aee7d19 1->5 2->1 8 aee89d5-aee89de 4->8 49 aee7d1f-aee7d7a 5->49 50 aee8292-aee82c1 5->50 10 aee82fa-aee8303 8->10 11 aee89e4-aee89fb 8->11 12 aee830a-aee83fe 10->12 13 aee8305 10->13 32 aee8428 12->32 33 aee8400-aee840c 12->33 13->12 36 aee842e-aee844e 32->36 34 aee840e-aee8414 33->34 35 aee8416-aee841c 33->35 38 aee8426 34->38 35->38 41 aee84ae-aee8528 36->41 42 aee8450-aee84a9 36->42 38->36 61 aee857f-aee85c2 41->61 62 aee852a-aee857d 41->62 53 aee89d2 42->53 58 aee7d7f-aee7d8a 49->58 59 aee7d7c 49->59 50->4 53->8 60 aee81a4-aee81aa 58->60 59->58 63 aee7d8f-aee7dad 60->63 64 aee81b0-aee822d 60->64 90 aee85cd-aee85d3 61->90 62->90 67 aee7daf-aee7db3 63->67 68 aee7e04-aee7e19 63->68 107 aee827c-aee8282 64->107 67->68 70 aee7db5-aee7dc0 67->70 72 aee7e1b 68->72 73 aee7e20-aee7e36 68->73 75 aee7df6-aee7dfc 70->75 72->73 77 aee7e3d-aee7e54 73->77 78 aee7e38 73->78 82 aee7dfe-aee7dff 75->82 83 aee7dc2-aee7dc6 75->83 79 aee7e5b-aee7e71 77->79 80 aee7e56 77->80 78->77 87 aee7e78-aee7e7f 79->87 88 aee7e73 79->88 80->79 89 aee7e82-aee80a8 82->89 85 aee7dcc-aee7de4 83->85 86 aee7dc8 83->86 91 aee7deb-aee7df3 85->91 92 aee7de6 85->92 86->85 87->89 88->87 98 aee810c-aee8121 89->98 99 aee80aa-aee80ae 89->99 94 aee862a-aee8636 90->94 91->75 92->91 95 aee8638-aee86c0 94->95 96 aee85d5-aee85f7 94->96 132 aee8845-aee884e 95->132 101 aee85fe-aee8627 96->101 102 aee85f9 96->102 103 aee8128-aee8149 98->103 104 aee8123 98->104 99->98 106 aee80b0-aee80bf 99->106 101->94 102->101 111 aee814b 103->111 112 aee8150-aee816f 103->112 104->103 113 aee80fe-aee8104 106->113 109 aee822f-aee8279 107->109 110 aee8284-aee828a 107->110 109->107 110->50 111->112 117 aee8176-aee8196 112->117 118 aee8171 112->118 114 aee8106-aee8107 113->114 115 aee80c1-aee80c5 113->115 120 aee81a1 114->120 121 aee80cf-aee80f0 115->121 122 aee80c7-aee80cb 115->122 123 aee819d 117->123 124 aee8198 117->124 118->117 120->60 126 aee80f7-aee80fb 121->126 127 aee80f2 121->127 122->121 123->120 124->123 126->113 127->126 133 aee8854-aee88af 132->133 134 aee86c5-aee86da 132->134 149 aee88e6-aee8910 133->149 150 aee88b1-aee88e4 133->150 135 aee86dc 134->135 136 aee86e3-aee8839 134->136 135->136 137 aee872e-aee876e 135->137 138 aee87b8-aee87f8 135->138 139 aee86e9-aee8729 135->139 140 aee8773-aee87b3 135->140 153 aee883f 136->153 137->153 138->153 139->153 140->153 158 aee8919-aee89ac 149->158 150->158 153->132 162 aee89b3-aee89cb 158->162 162->53
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: UUUU
                                                                        • API String ID: 0-1798160573
                                                                        • Opcode ID: f52e010372d4a122f57c70f608ebf7be9d4baaaa2bb5f8cb077743e1837ba7e5
                                                                        • Instruction ID: 40d234519ad6df7149958d3c0c0f2a80d69fefc0023d28d9b68cb13ac20543c8
                                                                        • Opcode Fuzzy Hash: f52e010372d4a122f57c70f608ebf7be9d4baaaa2bb5f8cb077743e1837ba7e5
                                                                        • Instruction Fuzzy Hash: E9A2C375A00628DFDB64CF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77647662dc0444f36433cb7dc0bcdacfeda34d5489869e304ef56b57f833248e
                                                                        • Instruction ID: 64a961eda8fc8f88b6b66ea4046b53216cd7cd2b90e5014ce8ceb1d23796d586
                                                                        • Opcode Fuzzy Hash: 77647662dc0444f36433cb7dc0bcdacfeda34d5489869e304ef56b57f833248e
                                                                        • Instruction Fuzzy Hash: ED526DB0B001159FDB58DF68C884AAD7BF2EF85724F158269E816DB3A0DB35ED01CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9e14be4f93961879754932f0f41e435f80a46c2662dbb1d041e0ad53c1ca7204
                                                                        • Instruction ID: 09c0a901a4d0b35b2e2e4ed12a345464b364af4271c432f673ef5febca6de272
                                                                        • Opcode Fuzzy Hash: 9e14be4f93961879754932f0f41e435f80a46c2662dbb1d041e0ad53c1ca7204
                                                                        • Instruction Fuzzy Hash: CA811374E012099FDB04DFA5DA849DEFBB2FF88311F208529D505BB298E7349A41CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4bbaab15f8256f676055a2d1bcaefe211feba3ac6ba14e6b34437612cbe3ba6f
                                                                        • Instruction ID: 0a792063a98e1f0ab5fd7a435d8be5eecd8a913f8d7e2596972d225c7767de93
                                                                        • Opcode Fuzzy Hash: 4bbaab15f8256f676055a2d1bcaefe211feba3ac6ba14e6b34437612cbe3ba6f
                                                                        • Instruction Fuzzy Hash: D1710374E012098FDB04DFA5DA8499EFBB2FF88311F208529D516B7258E7349A45CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 163 adc0b55-adc0bf5 165 adc0c2e-adc0c4e 163->165 166 adc0bf7-adc0c01 163->166 171 adc0c87-adc0cb6 165->171 172 adc0c50-adc0c5a 165->172 166->165 167 adc0c03-adc0c05 166->167 168 adc0c28-adc0c2b 167->168 169 adc0c07-adc0c11 167->169 168->165 173 adc0c15-adc0c24 169->173 174 adc0c13 169->174 182 adc0cef-adc0da9 CreateProcessA 171->182 183 adc0cb8-adc0cc2 171->183 172->171 175 adc0c5c-adc0c5e 172->175 173->173 176 adc0c26 173->176 174->173 177 adc0c60-adc0c6a 175->177 178 adc0c81-adc0c84 175->178 176->168 180 adc0c6c 177->180 181 adc0c6e-adc0c7d 177->181 178->171 180->181 181->181 184 adc0c7f 181->184 194 adc0dab-adc0db1 182->194 195 adc0db2-adc0e38 182->195 183->182 185 adc0cc4-adc0cc6 183->185 184->178 187 adc0cc8-adc0cd2 185->187 188 adc0ce9-adc0cec 185->188 189 adc0cd4 187->189 190 adc0cd6-adc0ce5 187->190 188->182 189->190 190->190 192 adc0ce7 190->192 192->188 194->195 205 adc0e48-adc0e4c 195->205 206 adc0e3a-adc0e3e 195->206 208 adc0e5c-adc0e60 205->208 209 adc0e4e-adc0e52 205->209 206->205 207 adc0e40 206->207 207->205 211 adc0e70-adc0e74 208->211 212 adc0e62-adc0e66 208->212 209->208 210 adc0e54 209->210 210->208 214 adc0e86-adc0e8d 211->214 215 adc0e76-adc0e7c 211->215 212->211 213 adc0e68 212->213 213->211 216 adc0e8f-adc0e9e 214->216 217 adc0ea4 214->217 215->214 216->217 219 adc0ea5 217->219 219->219
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0ADC0D96
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: e1ed91cd19e03b8ecb32c897855fac0ddb517d42c6af8573f4424309459bbbd8
                                                                        • Instruction ID: 3eea4957617717eb6f47fd0c8894a1c2fcf2f20ea79a003c3b63786250f48a6a
                                                                        • Opcode Fuzzy Hash: e1ed91cd19e03b8ecb32c897855fac0ddb517d42c6af8573f4424309459bbbd8
                                                                        • Instruction Fuzzy Hash: B6A18C71D1021ACFDF20CFA8C9817EDBBB2BF48304F5585A9D849A7240EB749985CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 220 adc0b60-adc0bf5 222 adc0c2e-adc0c4e 220->222 223 adc0bf7-adc0c01 220->223 228 adc0c87-adc0cb6 222->228 229 adc0c50-adc0c5a 222->229 223->222 224 adc0c03-adc0c05 223->224 225 adc0c28-adc0c2b 224->225 226 adc0c07-adc0c11 224->226 225->222 230 adc0c15-adc0c24 226->230 231 adc0c13 226->231 239 adc0cef-adc0da9 CreateProcessA 228->239 240 adc0cb8-adc0cc2 228->240 229->228 232 adc0c5c-adc0c5e 229->232 230->230 233 adc0c26 230->233 231->230 234 adc0c60-adc0c6a 232->234 235 adc0c81-adc0c84 232->235 233->225 237 adc0c6c 234->237 238 adc0c6e-adc0c7d 234->238 235->228 237->238 238->238 241 adc0c7f 238->241 251 adc0dab-adc0db1 239->251 252 adc0db2-adc0e38 239->252 240->239 242 adc0cc4-adc0cc6 240->242 241->235 244 adc0cc8-adc0cd2 242->244 245 adc0ce9-adc0cec 242->245 246 adc0cd4 244->246 247 adc0cd6-adc0ce5 244->247 245->239 246->247 247->247 249 adc0ce7 247->249 249->245 251->252 262 adc0e48-adc0e4c 252->262 263 adc0e3a-adc0e3e 252->263 265 adc0e5c-adc0e60 262->265 266 adc0e4e-adc0e52 262->266 263->262 264 adc0e40 263->264 264->262 268 adc0e70-adc0e74 265->268 269 adc0e62-adc0e66 265->269 266->265 267 adc0e54 266->267 267->265 271 adc0e86-adc0e8d 268->271 272 adc0e76-adc0e7c 268->272 269->268 270 adc0e68 269->270 270->268 273 adc0e8f-adc0e9e 271->273 274 adc0ea4 271->274 272->271 273->274 276 adc0ea5 274->276 276->276
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0ADC0D96
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: f86ea4ea17b741a4a0e8bc3777169e7f3cd5da562ae561e12ee90191e466b5ac
                                                                        • Instruction ID: 852d01b6fe1090adb06d0103b1ff582bfa43a046f0884b9fbf19e3fd55ba13f9
                                                                        • Opcode Fuzzy Hash: f86ea4ea17b741a4a0e8bc3777169e7f3cd5da562ae561e12ee90191e466b5ac
                                                                        • Instruction Fuzzy Hash: 0F917C71D1021ACFDF20CFA8C9817EEBBB2BF48314F558569D819A7240EB749A85CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 277 f8b723-f8b72a 278 f8b72c 277->278 279 f8b730-f8b745 call f8b154 277->279 278->279 282 f8b75b-f8b75f 279->282 283 f8b747 279->283 284 f8b761-f8b76b 282->284 285 f8b773-f8b7b4 282->285 334 f8b74d call f8b9b8 283->334 335 f8b74d call f8b9a8 283->335 284->285 290 f8b7c1-f8b7cf 285->290 291 f8b7b6-f8b7be 285->291 286 f8b753-f8b755 286->282 287 f8b890-f8b90a 286->287 327 f8b90c 287->327 328 f8b910-f8b950 287->328 293 f8b7d1-f8b7d6 290->293 294 f8b7f3-f8b7f5 290->294 291->290 295 f8b7d8-f8b7df call f8b160 293->295 296 f8b7e1 293->296 297 f8b7f8-f8b7ff 294->297 299 f8b7e3-f8b7f1 295->299 296->299 300 f8b80c-f8b813 297->300 301 f8b801-f8b809 297->301 299->297 304 f8b820-f8b829 call f8b170 300->304 305 f8b815-f8b81d 300->305 301->300 310 f8b82b-f8b833 304->310 311 f8b836-f8b83b 304->311 305->304 310->311 312 f8b859-f8b85d 311->312 313 f8b83d-f8b844 311->313 336 f8b860 call f8bcc0 312->336 337 f8b860 call f8bc91 312->337 313->312 314 f8b846-f8b856 call f8b180 call f8b190 313->314 314->312 317 f8b863-f8b866 320 f8b868-f8b886 317->320 321 f8b889-f8b88f 317->321 320->321 327->328 329 f8b958-f8b983 GetModuleHandleW 328->329 330 f8b952-f8b955 328->330 331 f8b98c-f8b9a0 329->331 332 f8b985-f8b98b 329->332 330->329 332->331 334->286 335->286 336->317 337->317
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 66d2d7307e1d590d9b13938fd78c071b7f0f5a434714549b0fb3c3b51b5c89af
                                                                        • Instruction ID: 2814d1d4c7ac95dba19d3c538dcee79d884e445241e8eeed48458574222bb994
                                                                        • Opcode Fuzzy Hash: 66d2d7307e1d590d9b13938fd78c071b7f0f5a434714549b0fb3c3b51b5c89af
                                                                        • Instruction Fuzzy Hash: 90813870A00B058FD724EF6AD45579ABBF1FF88314F00892DE48ADBB50D774E90A9B91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 338 f8b1a0-f8b1ad 341 f8b1af 338->341 342 f8b204-f8b208 338->342 343 f8b1b1-f8b1b3 341->343 344 f8b1b5-f8b1bf 341->344 345 f8ba18-f8ba6f 342->345 343->345 348 f8bb98-f8bbd8 344->348 346 f8ba71-f8ba96 345->346 347 f8bac3-f8bb13 345->347 346->347 355 f8ba98-f8ba9a 346->355 361 f8bb1c-f8bb4d 347->361 362 f8bb15-f8bb1b 347->362 349 f8bbda-f8bbdd 348->349 350 f8bbe0-f8bc0f LoadLibraryExW 348->350 349->350 352 f8bc18-f8bc35 350->352 353 f8bc11-f8bc17 350->353 353->352 359 f8ba9c-f8baa6 355->359 360 f8babd-f8bac0 355->360 363 f8baa8 359->363 364 f8baaa-f8bab9 359->364 360->347 368 f8bb5d-f8bb5e 361->368 369 f8bb4f-f8bb53 361->369 362->361 363->364 364->364 366 f8babb 364->366 366->360 368->348 369->368 370 f8bb55 369->370 370->368
                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F8B9F1,00000800,00000000,00000000), ref: 00F8BC02
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 729da6f139e40999051d2b4320aeac68df6cf103f5bf8b8b2d97479e49bf8afd
                                                                        • Instruction ID: b4cd40a257f862def62aa4ae9bdb89d4ebbdd4a48beae5bd142bedb12c14b055
                                                                        • Opcode Fuzzy Hash: 729da6f139e40999051d2b4320aeac68df6cf103f5bf8b8b2d97479e49bf8afd
                                                                        • Instruction Fuzzy Hash: C66178B1D043088FDB10DFA9C885BDEBBF5EB88324F14812AE815AB751D7749845DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 372 f85b24-f85b26 373 f85b28-f85b2a 372->373 374 f85b2c-f85b2d 372->374 373->374 375 f85b30-f85bf1 CreateActCtxA 373->375 374->375 377 f85bfa-f85c54 375->377 378 f85bf3-f85bf9 375->378 385 f85c63-f85c67 377->385 386 f85c56-f85c59 377->386 378->377 387 f85c78 385->387 388 f85c69-f85c75 385->388 386->385 390 f85c79 387->390 388->387 390->390
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 00F85BE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 9857dab315d2bb30e78b9df4d06446d69c6c90f0ddc92c6eba50ceec5fe49910
                                                                        • Instruction ID: 8aed31908eedd7ecdee1591490fbc84dc5005275bc315ba5dadfc06c85d39de3
                                                                        • Opcode Fuzzy Hash: 9857dab315d2bb30e78b9df4d06446d69c6c90f0ddc92c6eba50ceec5fe49910
                                                                        • Instruction Fuzzy Hash: 9641F171C0061CCFDB24DFA9C984BDEBBB1BF89704F248069D408AB651DB746949CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 391 f84338-f85bf1 CreateActCtxA 394 f85bfa-f85c54 391->394 395 f85bf3-f85bf9 391->395 402 f85c63-f85c67 394->402 403 f85c56-f85c59 394->403 395->394 404 f85c78 402->404 405 f85c69-f85c75 402->405 403->402 407 f85c79 404->407 405->404 407->407
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 00F85BE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 18cdecf96f776339e4e3d101e80a3ed92cc709cc8d426d52f6d1fa73865928c1
                                                                        • Instruction ID: 3c7f55883362ff6e99a31caed5b323d943bb90a90d1f6758ea7efdccb8910428
                                                                        • Opcode Fuzzy Hash: 18cdecf96f776339e4e3d101e80a3ed92cc709cc8d426d52f6d1fa73865928c1
                                                                        • Instruction Fuzzy Hash: EE41F1B1C0061CCBDB24DFA9C984BDEBBB1BF49708F248069D408BB251DB746949CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 408 adc07c9-adc07d0 409 adc0801-adc0806 408->409 410 adc07d2-adc07d4 408->410 411 adc081e-adc0866 409->411 410->411 412 adc07d6-adc07e2 410->412 416 adc0868-adc0874 411->416 417 adc0876-adc08b5 WriteProcessMemory 411->417 413 adc07e9-adc0806 412->413 414 adc07e4 412->414 414->413 416->417 421 adc08be-adc08ee 417->421 422 adc08b7-adc08bd 417->422 422->421
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0ADC08A8
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: afaae9a7e73749417028e40e55e5f9724bc9310d99202b6d7f4aec79d4007e2e
                                                                        • Instruction ID: 1ca05d3931d1c1a9aa96c8f32628c0f5834180efdf93d33e0fc55b14bc9ba807
                                                                        • Opcode Fuzzy Hash: afaae9a7e73749417028e40e55e5f9724bc9310d99202b6d7f4aec79d4007e2e
                                                                        • Instruction Fuzzy Hash: 4F315675900249CFCB10DFA9D8807EEBBB0BF48314F55842AE919A7A51D7799A44CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 427 adc0810-adc0814 428 adc07bb-adc07c1 427->428 429 adc0816-adc0866 427->429 433 adc0868-adc0874 429->433 434 adc0876-adc08b5 WriteProcessMemory 429->434 433->434 436 adc08be-adc08ee 434->436 437 adc08b7-adc08bd 434->437 437->436
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0ADC08A8
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 7c37425560896bc5d0a36d0fd2188a217adc9db1265677d8c904e8f230c9bffb
                                                                        • Instruction ID: 8075413d03510c47e6cc2ee0fb6e4a9c900f974a40ea1b6c9a5b0025149db2bf
                                                                        • Opcode Fuzzy Hash: 7c37425560896bc5d0a36d0fd2188a217adc9db1265677d8c904e8f230c9bffb
                                                                        • Instruction Fuzzy Hash: 81315871900209DFCB10DFA9D8847DEBBB4FF48324F50842AE918A7A50D7799954CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 441 adc0818-adc0866 444 adc0868-adc0874 441->444 445 adc0876-adc08b5 WriteProcessMemory 441->445 444->445 447 adc08be-adc08ee 445->447 448 adc08b7-adc08bd 445->448 448->447
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0ADC08A8
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: f5886de683e30de7200ea4be0bf32ec9249940fac298ef0544b3c691f0f16534
                                                                        • Instruction ID: 405fc4e9ede45266e564ff24a6aad8b9867b44689327d9a5efb80e96a8de4166
                                                                        • Opcode Fuzzy Hash: f5886de683e30de7200ea4be0bf32ec9249940fac298ef0544b3c691f0f16534
                                                                        • Instruction Fuzzy Hash: 7B2126719003499FCB10DFA9C8857DEBBF5FF48314F508429E918A7750D7789A44CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 452 adc0941-adc09d5 ReadProcessMemory 456 adc09de-adc0a0e 452->456 457 adc09d7-adc09dd 452->457 457->456
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0ADC09C8
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: f006b7fc59f63686177ddf35a1f23374f03740e6146a5b0c74479221b05dd915
                                                                        • Instruction ID: 79d5d970b4954b55bf4c0cdd56ce9e2440beaa10a0c65968e112c930cb1a2cb4
                                                                        • Opcode Fuzzy Hash: f006b7fc59f63686177ddf35a1f23374f03740e6146a5b0c74479221b05dd915
                                                                        • Instruction Fuzzy Hash: 69212571900249DFDB10DFAAC8857EEFBF5FF48324F50842AE918A7650D7789944CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 461 f8d7a4-f8dcec DuplicateHandle 463 f8dcee-f8dcf4 461->463 464 f8dcf5-f8dd12 461->464 463->464
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F8DC1E,?,?,?,?,?), ref: 00F8DCDF
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 56630a3901f97d3ca3852f3bfe25b91f3d39a8b29d375e35720e1f981047cb58
                                                                        • Instruction ID: 7c4b8fd7b2579d034fc6928ed3bcb3a7dae48c3ab8480c3bb8187214eeb7ea15
                                                                        • Opcode Fuzzy Hash: 56630a3901f97d3ca3852f3bfe25b91f3d39a8b29d375e35720e1f981047cb58
                                                                        • Instruction Fuzzy Hash: EF21E5B5900249AFDB10CF99D984ADEBBF8FF48324F14801AE915B3750D374A954DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 467 adc0538-adc058b 469 adc058d-adc0599 467->469 470 adc059b-adc05cb SetThreadContext 467->470 469->470 472 adc05cd-adc05d3 470->472 473 adc05d4-adc0604 470->473 472->473
                                                                        APIs
                                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 0ADC05BE
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 3a9658eb41ebc6ee81c3b0344306a98daab2c53da1fe47776ba6fe579ac5c6ed
                                                                        • Instruction ID: cecedc3389c0f7076ffe6e63f25d6c35e004e2920c85a59b7f76f30aca8d93e7
                                                                        • Opcode Fuzzy Hash: 3a9658eb41ebc6ee81c3b0344306a98daab2c53da1fe47776ba6fe579ac5c6ed
                                                                        • Instruction Fuzzy Hash: 5E212871D102498FDB50DFA9C4857EEBBF4AF48314F54842ED419A7640DB789945CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 487 adc0948-adc09d5 ReadProcessMemory 490 adc09de-adc0a0e 487->490 491 adc09d7-adc09dd 487->491 491->490
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0ADC09C8
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: df03dab76c239771a1ca782914bd43bb5b53733e39b1319ac99549ea7b3999fc
                                                                        • Instruction ID: 2f02bed98b18bcf047d2f76a725941b9a2fb091ba93ed94bcb88a4b29d239f5e
                                                                        • Opcode Fuzzy Hash: df03dab76c239771a1ca782914bd43bb5b53733e39b1319ac99549ea7b3999fc
                                                                        • Instruction Fuzzy Hash: F52116719003499FCB10DFA9C8817EEBBF5FF48324F54842AE518A7650D7789944CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 477 adc0540-adc058b 479 adc058d-adc0599 477->479 480 adc059b-adc05cb SetThreadContext 477->480 479->480 482 adc05cd-adc05d3 480->482 483 adc05d4-adc0604 480->483 482->483
                                                                        APIs
                                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 0ADC05BE
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 4c397061f375d17581c1d7e8453f3149a1bdc8a5f3769e2e1e959aaef7f96af4
                                                                        • Instruction ID: 59f380e57a145a1babda2db164e3bf020b08330554cc55bf74aac1a156281465
                                                                        • Opcode Fuzzy Hash: 4c397061f375d17581c1d7e8453f3149a1bdc8a5f3769e2e1e959aaef7f96af4
                                                                        • Instruction Fuzzy Hash: 852137719103098FDB10DFAAC4857EEBBF4AB48224F54842ED419A7740DB78AA45CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F8B9F1,00000800,00000000,00000000), ref: 00F8BC02
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: de5330e276510dc65534bb2bd6dfcc7a568ae0a0c76817d5d1084906880c2d20
                                                                        • Instruction ID: c510c8fd8344c6904f797a43894924baa0e8984e7a874ee5b9145637a0337e05
                                                                        • Opcode Fuzzy Hash: de5330e276510dc65534bb2bd6dfcc7a568ae0a0c76817d5d1084906880c2d20
                                                                        • Instruction Fuzzy Hash: C11129B6D002498FDB10DF9AC844BDEFBF4EB88364F10841AE419A7710C375A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F8B9F1,00000800,00000000,00000000), ref: 00F8BC02
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 4b21395a20bea0b0e9ab8a58b379ae0dd2b8fbee39f35eeaa6809c62bd41b786
                                                                        • Instruction ID: 0220d9dfd9a5845138002a97c4a50c72da0c4f1cfd0b8f7d551b7c83d6ea7e7e
                                                                        • Opcode Fuzzy Hash: 4b21395a20bea0b0e9ab8a58b379ae0dd2b8fbee39f35eeaa6809c62bd41b786
                                                                        • Instruction Fuzzy Hash: D71103B6D002098FDB10DF9AC444BDEFBF4AB98364F10842AE419A7610C375A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0ADC0786
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 8a18cc5b102baa0d8903ce8dc7e6967d87835629d50d28e15266f52085d52a4c
                                                                        • Instruction ID: b352ab71f4536f1f9c29377fb9052edcc725b4cff37bf2398d5c0b6ce3c4cb9e
                                                                        • Opcode Fuzzy Hash: 8a18cc5b102baa0d8903ce8dc7e6967d87835629d50d28e15266f52085d52a4c
                                                                        • Instruction Fuzzy Hash: 861144719002498FCB10DFA9C8447EFBBF5AF48324F24841AE429A7650C7799944CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0ADC0786
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 92e9ddbd298ea161cb89992ff861cf21c64da00e9e7b611fae12d7e893a0b39a
                                                                        • Instruction ID: e1849e91083c23712bc09b012e2d654727a7b049ca4fb17355617609a9f2992d
                                                                        • Opcode Fuzzy Hash: 92e9ddbd298ea161cb89992ff861cf21c64da00e9e7b611fae12d7e893a0b39a
                                                                        • Instruction Fuzzy Hash: 621123729002499BCB10DFAAC845BEFBBF5AB48324F548819E529A7650C779A944CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: c2b90393abc211e10b1503d3aa0aea53b3c4ef49e6579a64794ddcbf32f1d5a9
                                                                        • Instruction ID: 729980c535c08dcace1669dd3f7679a82ed5f8249a0344503e00ddda8a83f68a
                                                                        • Opcode Fuzzy Hash: c2b90393abc211e10b1503d3aa0aea53b3c4ef49e6579a64794ddcbf32f1d5a9
                                                                        • Instruction Fuzzy Hash: 221143B19002498FCB20DFA9C4447EFBBF5AB98324F14842ED419A7B50C779A948CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: 7f0a1e3de9f06e0adef12b7fb80ddee6e79b4f638453769d56e9e03d6d5c09ed
                                                                        • Instruction ID: 2a5a0f51f9409cb0005e3b03c9ad098f3595aaf9f80302aac9af202be9bbafe3
                                                                        • Opcode Fuzzy Hash: 7f0a1e3de9f06e0adef12b7fb80ddee6e79b4f638453769d56e9e03d6d5c09ed
                                                                        • Instruction Fuzzy Hash: 601125B19003498BCB10DFAAC4457EFFBF4AB88224F54841DD419A7750DB79A944CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00F8B976
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.324398634.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_f80000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 5928a53f8c51bd7ed7b106d7e82dfcf514e70aa41bd7d76cae09f9e674895209
                                                                        • Instruction ID: 47387849c8625796ac0e6aef6e470e0938792d1120fd9111ab74f2ffe5f90a5c
                                                                        • Opcode Fuzzy Hash: 5928a53f8c51bd7ed7b106d7e82dfcf514e70aa41bd7d76cae09f9e674895209
                                                                        • Instruction Fuzzy Hash: 7311E0B6D002498FCB10DF9AD884BDEFBF4AB88324F14851AD869B7711C374A545CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • PostMessageW.USER32(?,?,?,?), ref: 0ADCBDAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346111387.000000000ADC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ADC0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_adc0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 847a73bdbffc5d1aae53eb1a38fec6bb89f6642a43378d1aac2fc7909671a5e3
                                                                        • Instruction ID: dca0334b09f7d21b2752a90582fba1f672c4877abbf9c278668a9934eb141460
                                                                        • Opcode Fuzzy Hash: 847a73bdbffc5d1aae53eb1a38fec6bb89f6642a43378d1aac2fc7909671a5e3
                                                                        • Instruction Fuzzy Hash: CF11D0B58002499FDB10DF9AD885BDEBBF8EB58324F10845AE859A7710D374A944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 88e705abcf6d05366c612e0d5509220b77411066fd477c89b8ffa7100968f72a
                                                                        • Instruction ID: 25b5301eeff1679216907e894072acb9abc8e7bcfe1514c2f5d9cf4ecf379170
                                                                        • Opcode Fuzzy Hash: 88e705abcf6d05366c612e0d5509220b77411066fd477c89b8ffa7100968f72a
                                                                        • Instruction Fuzzy Hash: 69722C31910609CFDB14EF68C898A9DB7B1FF85315F008299D54AAB265FF70AEC5CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6286790e421954537ca9bfe1537cbbf4095fa0da67dad4a4f7f3d943a7cc5c79
                                                                        • Instruction ID: 890605b04da7d9838d133b9b18d0b86bb6cbd769207bb343a7afba2bf0ca1956
                                                                        • Opcode Fuzzy Hash: 6286790e421954537ca9bfe1537cbbf4095fa0da67dad4a4f7f3d943a7cc5c79
                                                                        • Instruction Fuzzy Hash: A4D1CEB0B00106CFEB15AB64C5446AEBBF2FF45364F654AA9D442B72E5EB30D825CBC1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ba3884ad509a8a3e75d7c64789932006db29d4b0cca2369f48eadc69341817c3
                                                                        • Instruction ID: 93863e24c7d5e4034b7facb2980289d898227559b122b2e9af438a4d960b312a
                                                                        • Opcode Fuzzy Hash: ba3884ad509a8a3e75d7c64789932006db29d4b0cca2369f48eadc69341817c3
                                                                        • Instruction Fuzzy Hash: D8A1D1B5A002059FEB14EBB4D5183AE7BF6EF88364F144969D409AB381DB388D45CBE1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c8bc80bd41ee4a76a76246fe6315abf0a70026cd1621f1b58f670ed93a24135c
                                                                        • Instruction ID: bfd25cb15fcaa01cda1a0250a5036a923c98e9aaac55678cb42e2ea8ffd427de
                                                                        • Opcode Fuzzy Hash: c8bc80bd41ee4a76a76246fe6315abf0a70026cd1621f1b58f670ed93a24135c
                                                                        • Instruction Fuzzy Hash: 5F91C2B13006019FEB19EB74C494AAEB3E2AF85324F118A6DE5568B3D0DF34DD06C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 16b09f5b7894512e133307b4a23e4ec546970f137eab8952e68293d45392fdc0
                                                                        • Instruction ID: b989eefd4d5f275be51a93a34b4e9992af6eb2ee56d2c11c725bacf0080e80f2
                                                                        • Opcode Fuzzy Hash: 16b09f5b7894512e133307b4a23e4ec546970f137eab8952e68293d45392fdc0
                                                                        • Instruction Fuzzy Hash: F271D3B06002059FEB24AB65D454BAFB7E6EFC4310F148A29E506A77E0CF359946CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a359659d66ea2c9e2343044717161342adb46b4a4ad4c685425a4947e1b7cdfa
                                                                        • Instruction ID: 152d80636cb12194a4eebee56ef1cabe984584458b45579543f8d6f604049674
                                                                        • Opcode Fuzzy Hash: a359659d66ea2c9e2343044717161342adb46b4a4ad4c685425a4947e1b7cdfa
                                                                        • Instruction Fuzzy Hash: 5891E5B5A0060A9FDB51CFA8C884ADEB7F1FF48320F148629E92997391D734E955CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 42b3ca8e2d337c14dd7a5c47380892837803c6bac3b44e3c4003262ba7e65c67
                                                                        • Instruction ID: af936d3304ba66a6e4e05bbfe48a654e37aafb4339bf0f69f7759fff3e3af966
                                                                        • Opcode Fuzzy Hash: 42b3ca8e2d337c14dd7a5c47380892837803c6bac3b44e3c4003262ba7e65c67
                                                                        • Instruction Fuzzy Hash: 0A51C0B1B001418FEB24DB64C854BAE77F2EF86324F044669E516DB3D0DB38A902CBD6
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c6610752ff2eb7a32885de364de93f9a11536bed5771dba3008f32a48d301cc1
                                                                        • Instruction ID: 05c4f8943013da3958e830deb437e82b2ef1f2483aa95dbb2db439cf5b0c365a
                                                                        • Opcode Fuzzy Hash: c6610752ff2eb7a32885de364de93f9a11536bed5771dba3008f32a48d301cc1
                                                                        • Instruction Fuzzy Hash: 87618D74B00219CFDB14DF68D448AAD7BF7AF89621F144169E902AB391DBB2DC11CBE1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bee6272baccfe4c195f51acbe293b639621801e870a3f1b7064b69f9d23f5076
                                                                        • Instruction ID: 4b379c0cfd87b1ef6310f3ab767be5705be90f64a48bac6e5dfbf53f189559a9
                                                                        • Opcode Fuzzy Hash: bee6272baccfe4c195f51acbe293b639621801e870a3f1b7064b69f9d23f5076
                                                                        • Instruction Fuzzy Hash: C6811874A00248CFDB04EFA8C49899DBBF1FF49304F1585A9D809AF36ADB71E945CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab58a21597c63304126fd16fa4c3e4100926d127b25a1e3b1862eced15b0ed30
                                                                        • Instruction ID: 8db1ae88c6f7b9a267420b50567f73cd4172631eab11bb604b0f7d38171e04c1
                                                                        • Opcode Fuzzy Hash: ab58a21597c63304126fd16fa4c3e4100926d127b25a1e3b1862eced15b0ed30
                                                                        • Instruction Fuzzy Hash: 2C51D1B5601601DFD719EFB8C09496AB7B6FF86320B5182ADD019CB392DB35EC02CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dda0c7acd075dfdc4156f176861a89f45287ca2fb5c67345c9c600798be8d9ea
                                                                        • Instruction ID: b2f27be839a6def3f8a207b883146833a23b824a2592ca88f34fa86cd5bd871a
                                                                        • Opcode Fuzzy Hash: dda0c7acd075dfdc4156f176861a89f45287ca2fb5c67345c9c600798be8d9ea
                                                                        • Instruction Fuzzy Hash: BC5172B1600601DFEB26DF74C484AAAB7F2BF45324F118A2DD5568B3E1DB31E806CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dec141cd77f09d33c9be13c18e420ef861ab2158ee98ded1a96565be97d244a6
                                                                        • Instruction ID: 12819c432ff78ac066e4fd12bbc37b88bdfcbf7075a9c2b5e30e4d70bfadcde2
                                                                        • Opcode Fuzzy Hash: dec141cd77f09d33c9be13c18e420ef861ab2158ee98ded1a96565be97d244a6
                                                                        • Instruction Fuzzy Hash: 0B5151B0200605DFEB26DF74C484AAAB7F2BF85324F10862DE5568B3E0DB31E805CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b2ce96befd9038bea70fecd0417586a30483e8ae388d83509590e7c9165db018
                                                                        • Instruction ID: 86a9e0a3f7fcca9467c5bcfc85ed1f9d4e6d306fdd6d907c1e75a15efdc57d82
                                                                        • Opcode Fuzzy Hash: b2ce96befd9038bea70fecd0417586a30483e8ae388d83509590e7c9165db018
                                                                        • Instruction Fuzzy Hash: 92511D74A1060A8FDB04EFA8C8948EEF7B1FF89210F108769E405A7355EB34E985CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bfa9b69a27eae475e80b7b8df8c6cdfcb699c51c0ff9e7326a015047fa1e1857
                                                                        • Instruction ID: bd1ca860c7946cd40f12d465785ee4fda6672ee3db785311ccb0bad467b2d131
                                                                        • Opcode Fuzzy Hash: bfa9b69a27eae475e80b7b8df8c6cdfcb699c51c0ff9e7326a015047fa1e1857
                                                                        • Instruction Fuzzy Hash: 904171B4B11605CFEB14EFA5E914AAEBBF6AF89310F108529D40997394DB31D801CBE2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a423684cf76be38b1050c67c9f10e4996d8e09582cc8068ce24db7691697993c
                                                                        • Instruction ID: a31b4fd38901399355455c6afe6589a21d10d2e6652d1a52b916fbd60cbb5947
                                                                        • Opcode Fuzzy Hash: a423684cf76be38b1050c67c9f10e4996d8e09582cc8068ce24db7691697993c
                                                                        • Instruction Fuzzy Hash: 5941E5B4B01646DFD714DFA8D5146AEBBF2AF89310F248169D809CB391DB31DD01CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1fd8d39913622829bea130e05c5ac32a93f59dfe8dd4a4a7c05324611abf2df7
                                                                        • Instruction ID: 102c10df85f909678baa43a9c5db372a60b1b555b31d9a6d56d1ac2cbaf4a312
                                                                        • Opcode Fuzzy Hash: 1fd8d39913622829bea130e05c5ac32a93f59dfe8dd4a4a7c05324611abf2df7
                                                                        • Instruction Fuzzy Hash: 3241E2B0B04256CFEB15CF68C884A6E7FB6AF85220F0542AAD505CB392DB31D851C7E1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 130129cb1f268aa7135193db8b2873ba3fd6b8683e40a27eb3a06cf21653377c
                                                                        • Instruction ID: edce9c358a720ee89c061e026ec3759beb0ba8ca6eef094003cbc107f1268863
                                                                        • Opcode Fuzzy Hash: 130129cb1f268aa7135193db8b2873ba3fd6b8683e40a27eb3a06cf21653377c
                                                                        • Instruction Fuzzy Hash: DA414F75A0060A8FDB00DF64C8948EDFBB1FF89210B158759D446EB355EB34E985CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5074c49614c88b38f776acd9723185dfbc32f1b7abd93c1fc3639440bf407770
                                                                        • Instruction ID: 5e4e722498d799a8edca110cda259909f01ed0247bc1fcd344052d0059c8f937
                                                                        • Opcode Fuzzy Hash: 5074c49614c88b38f776acd9723185dfbc32f1b7abd93c1fc3639440bf407770
                                                                        • Instruction Fuzzy Hash: EA418DB1A0024A9FDB10DFA9D4446EEBBF5EF48364F148529E805E7740DB38E905DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 213fd2818ccebbfe0172a6837333784f6cfe5f2c30089b6983136ca35798ff58
                                                                        • Instruction ID: 1183b058e667379fe594b1a26eb5112ead562149bd6d7b6e8dc195c8368999e8
                                                                        • Opcode Fuzzy Hash: 213fd2818ccebbfe0172a6837333784f6cfe5f2c30089b6983136ca35798ff58
                                                                        • Instruction Fuzzy Hash: 43416B7070011A9FDB04EF64D844AAE7BA7EF84724F048128F9029B794CB79DD66CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69042d3ee723f2975dc833e481dad345d5c6426e9dd58a83a95e727395948f9e
                                                                        • Instruction ID: 4d03ce2ce0bf0746c026dcbccc0f7618adebd265b56aceaec05456e9ba1decfe
                                                                        • Opcode Fuzzy Hash: 69042d3ee723f2975dc833e481dad345d5c6426e9dd58a83a95e727395948f9e
                                                                        • Instruction Fuzzy Hash: 55418535A10609CFCB04EFA8D8848EDF7B5FF89314F00826AE515AB321EB71A945CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c3d10619fbbe46f57972f324264307ce87e5c72c95f58122df9439fbb91bf4bf
                                                                        • Instruction ID: fd7ae7ae2154fc30370af72eda56df2641fb191770945ecd8bdd78155e77727f
                                                                        • Opcode Fuzzy Hash: c3d10619fbbe46f57972f324264307ce87e5c72c95f58122df9439fbb91bf4bf
                                                                        • Instruction Fuzzy Hash: 2F418FB5A00601EFD719EFB8C094969B7F2FF45320B5182ACD4199B391CB32EC42CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 475de33b3c491f33c393df1d2322f6aa7adffbf14084644f051a0f0c92f6046e
                                                                        • Instruction ID: 9cd696df756e546189852de3f010344e632205301982de31f9b1293ba69818e5
                                                                        • Opcode Fuzzy Hash: 475de33b3c491f33c393df1d2322f6aa7adffbf14084644f051a0f0c92f6046e
                                                                        • Instruction Fuzzy Hash: BF414EB0B00149CFDB58EF68C55869DBBF2EF88224F24856ED405AB3A1DB30DC45CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e7f5ca4d8a23a490f7be519b5af1ecf8263b57028d9fe392c3b96ff5e34545a3
                                                                        • Instruction ID: 532ef9914238bd1a8e8b3f37830a65481c8851c7165d6790cbc9e0a9bccdfcc9
                                                                        • Opcode Fuzzy Hash: e7f5ca4d8a23a490f7be519b5af1ecf8263b57028d9fe392c3b96ff5e34545a3
                                                                        • Instruction Fuzzy Hash: C131ADB1B10219DFDB14EFA9D85449DBBF2FF89210F00862AE501A73A0DB709801CBE1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0a8186b5401e25ce176103ed9546feaa81d5740bde4ddba13c6c2a0e8f901151
                                                                        • Instruction ID: d74f7df8bf9670fdcee7255fd025dc0a54795a4179c6eea818718f0bd36a7af4
                                                                        • Opcode Fuzzy Hash: 0a8186b5401e25ce176103ed9546feaa81d5740bde4ddba13c6c2a0e8f901151
                                                                        • Instruction Fuzzy Hash: 253149B67103408FEB25DB64D8915BF7FF6DF81328B1881AAD146D7292CA38ED01C361
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c7c5370db8cedb78cdecb84cbab0e77fcf23f9508a0c6be972dd021304739a9
                                                                        • Instruction ID: 0ad84ea381e8998a32c3f5b871b69df893fe8fbbae751f8a87ee7d59d738afb1
                                                                        • Opcode Fuzzy Hash: 3c7c5370db8cedb78cdecb84cbab0e77fcf23f9508a0c6be972dd021304739a9
                                                                        • Instruction Fuzzy Hash: 4131A8B0601205EFEB24EF64C4447AEBBF6FF89210F14892DE516AB391DB74E941CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00cfeab76d8aef00a32bfe5f6a1364dc92b9290bdc8d3a5fdf80ed4ececc176d
                                                                        • Instruction ID: 93a418a104b644557aac55649e789880c70eb9bb66e547565fb0662cc2115319
                                                                        • Opcode Fuzzy Hash: 00cfeab76d8aef00a32bfe5f6a1364dc92b9290bdc8d3a5fdf80ed4ececc176d
                                                                        • Instruction Fuzzy Hash: D4212870A04244AFD741ABB48C01BEE7FB7DF86350F108066E546DF281DE785D168BA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 767e440dcfa2f37c79735ced4e7191ec33187c3ba8a0b9ae0a57eecbd371f07a
                                                                        • Instruction ID: 50b29bdfab9d262e346e85e3aa8e6c67693c5e85482b282ebb1ef69e2bcec9b1
                                                                        • Opcode Fuzzy Hash: 767e440dcfa2f37c79735ced4e7191ec33187c3ba8a0b9ae0a57eecbd371f07a
                                                                        • Instruction Fuzzy Hash: AB314331A10609DFCB04EFA8C4948EDBBB5FF89310F018659E5056B224FB70AA85CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0d0a58cd260e11ecefcf235774b5b56f7c9b9370d9d0c74e4d94126474c1f71
                                                                        • Instruction ID: c7b452a0547e33476764d9b3261c68e1e3d7541e153dac209af3fe77b61dea1f
                                                                        • Opcode Fuzzy Hash: f0d0a58cd260e11ecefcf235774b5b56f7c9b9370d9d0c74e4d94126474c1f71
                                                                        • Instruction Fuzzy Hash: 282126B67006118FEB24DA65C9815BFB7EAEBC4328F148569D146937D1C738ED40C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cdda2f881d23ae97886588eb61c0aed7df4ffd030075a6c0c893f4477698fac1
                                                                        • Instruction ID: 69a7e65aff54e5b0f3d7918013131a2f7b3d3beb52a0d8f279cb607e90b5506e
                                                                        • Opcode Fuzzy Hash: cdda2f881d23ae97886588eb61c0aed7df4ffd030075a6c0c893f4477698fac1
                                                                        • Instruction Fuzzy Hash: 25312431A10609DFCB04EFA8C854CEDBBB5FF89310F018659E5057B264FB70A989CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c09ca97f353acb6d7c439230c82a1343084f210ce46072b2a66b77a621507b32
                                                                        • Instruction ID: 3ba8859e55b7292d32388f6460388d7e805e68c865d0f19068b946d1cce310aa
                                                                        • Opcode Fuzzy Hash: c09ca97f353acb6d7c439230c82a1343084f210ce46072b2a66b77a621507b32
                                                                        • Instruction Fuzzy Hash: 3921D3B8700201AFDB10EFA4E9847AEBBF4EB44312F044A25E805E7380EB74D901CBA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8ab3891034f17ec0b22d3a03bee5283d05bc7c65aa19e1956034da36525c9926
                                                                        • Instruction ID: 9b1ae275a21ebcd68b01eca49cac2245cd105b9dcacc2486415f1f2e1bcd22d1
                                                                        • Opcode Fuzzy Hash: 8ab3891034f17ec0b22d3a03bee5283d05bc7c65aa19e1956034da36525c9926
                                                                        • Instruction Fuzzy Hash: F021BEB4E0010ADFDB54EFA8C898ABEB7F1FF89310F1085699515E73A1DA349942CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cd3bd1dc967c5844ba84412c08e1567176b9174b3c847d5f1be1fa772946a781
                                                                        • Instruction ID: 6062231ad2d9e4e637f61055a76e1df0db7f911b0b2b62d9ae114cef668c66a8
                                                                        • Opcode Fuzzy Hash: cd3bd1dc967c5844ba84412c08e1567176b9174b3c847d5f1be1fa772946a781
                                                                        • Instruction Fuzzy Hash: 6E21D5B27006818FFA25DA24C840BEE72E5EB86734F05072EE256873D0CF34E941C6D9
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fb7f7362f7338e1f5c1a3a05b428f8ee71622d0c7ab4c50b5383cce4043af500
                                                                        • Instruction ID: 4074528ca5c1ce372b04b53740ca741a37e9ad58b23b5a9743b0f3987638b4c9
                                                                        • Opcode Fuzzy Hash: fb7f7362f7338e1f5c1a3a05b428f8ee71622d0c7ab4c50b5383cce4043af500
                                                                        • Instruction Fuzzy Hash: 71214874E002199FDB08CFA9D8846EEBBB2FF89310F14816AD914B7344DB744A15CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b274f313c8fc16f8818799582f47b7713e8c3bdf35dfa160004ebf3eb4da938e
                                                                        • Instruction ID: 03718f421328341c100ed9c8e329ca73405884f6b46fc867ee3c063e399cf5ce
                                                                        • Opcode Fuzzy Hash: b274f313c8fc16f8818799582f47b7713e8c3bdf35dfa160004ebf3eb4da938e
                                                                        • Instruction Fuzzy Hash: ED214171A106099FDB10EF6CD84099AFBB4FF49310F54C26AE958A7204FB30A958CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 187968addd236aac8005838a76149bd0d9f965bc7fbbc08e5013c8db5930fe24
                                                                        • Instruction ID: 197a67b79fac97801eb668a281660e47fac07f1abbd1691c2b2b0e9c576dcb3f
                                                                        • Opcode Fuzzy Hash: 187968addd236aac8005838a76149bd0d9f965bc7fbbc08e5013c8db5930fe24
                                                                        • Instruction Fuzzy Hash: 7621EEB1D0020A9FDB10CF9AD984ADEFBF4FB58324F14852AE924A3210D374A904CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8b8ccc4af5a80b0dca9b46777981c790849fd1ac0151578cde16d55da0ceaa2a
                                                                        • Instruction ID: f7e2352cfc1d03e8768c74614963f34713bd282f3c7b0d73abe0349471cfbf1e
                                                                        • Opcode Fuzzy Hash: 8b8ccc4af5a80b0dca9b46777981c790849fd1ac0151578cde16d55da0ceaa2a
                                                                        • Instruction Fuzzy Hash: 4B2127B4E102199FDB04CFA9D884AEEBBF2FB89311F10812AD915B3344DB745A118FA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ee586a1b29c2b05b30ed020b8fc0c1d1a83e0731154bcc2dad148c3d2e2653d6
                                                                        • Instruction ID: d3f48b179bf62b74c1de52fc1ba65599e9506d716e4a56b7d49344f36d3e8d15
                                                                        • Opcode Fuzzy Hash: ee586a1b29c2b05b30ed020b8fc0c1d1a83e0731154bcc2dad148c3d2e2653d6
                                                                        • Instruction Fuzzy Hash: 5F21D7B0E05246CFD715DF28C050AAEFBF2AF09214F1585AAC414EB7A2D734E842CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0c55e721cafe7e1befb5146811c1a7ee903ab3515a3c2f49916d0c3035e74e74
                                                                        • Instruction ID: cc916c163b7ebbadac2d22e86bced4cde7d394b93165bacda86ae9e7be0edf45
                                                                        • Opcode Fuzzy Hash: 0c55e721cafe7e1befb5146811c1a7ee903ab3515a3c2f49916d0c3035e74e74
                                                                        • Instruction Fuzzy Hash: 27216671A00249DFDF04DFA4E849ADDBBF2EF48321F044429E901BB2A0C772AD54CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fab6f9f47227b64b4b2d75c78ce99e9435ed2f3044a392b20ef04e87e7f8f37d
                                                                        • Instruction ID: 8af1f944c300fe42aafba4b157cdf805dce94f7e57a7976f9ad1afa56f3882c0
                                                                        • Opcode Fuzzy Hash: fab6f9f47227b64b4b2d75c78ce99e9435ed2f3044a392b20ef04e87e7f8f37d
                                                                        • Instruction Fuzzy Hash: 2E11D5747002019FEB20EF54E994A6E7BF4EB44711F084A55E414EB391EB70D900CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3f55dae70301b4eb3a23cac7ebc829eafe9b33daa916ed684432bcc14b1d5c78
                                                                        • Instruction ID: 0b492221be2c84c1d69c9237a88044ec161a315b560b7a8d7fb57244eedca044
                                                                        • Opcode Fuzzy Hash: 3f55dae70301b4eb3a23cac7ebc829eafe9b33daa916ed684432bcc14b1d5c78
                                                                        • Instruction Fuzzy Hash: 94118630B001189BCB64EBB588106BFB6E7AF84754F04C16DE916DB780EF7489018BD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69484fbc75ef09a225cdaba7f8c53874ce0f7400d9202483916e902e74ece100
                                                                        • Instruction ID: 3eb19fc2b5938826ce1b22476186676276f43b400b298abb760021df9243cb95
                                                                        • Opcode Fuzzy Hash: 69484fbc75ef09a225cdaba7f8c53874ce0f7400d9202483916e902e74ece100
                                                                        • Instruction Fuzzy Hash: 36113DB0E01216CFEB24DF69C444AAEF7F1EF49314F14856AD418AB361D735A902CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f6f67a836541dd7749f2a8b78df34e04f4c63a3d8ebf9bd66f106da391d1ac9f
                                                                        • Instruction ID: 8fb64bd9e37de08890b6bfb602c86cc18671c70cdb7dc5f8cd5e1eb1a8adef07
                                                                        • Opcode Fuzzy Hash: f6f67a836541dd7749f2a8b78df34e04f4c63a3d8ebf9bd66f106da391d1ac9f
                                                                        • Instruction Fuzzy Hash: 381142B0E052468FDB64DF69C044AAEFBF1AF49310F19C5AAC458AB361D735E842CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0f5f95ef50a7c1f0e1ecfbc6833c40f3243e6e7978d576749428808ead162dab
                                                                        • Instruction ID: 8574d74524b2ede22356b483f61e4ebf6243e5c7a3848ed64f4e89f8c4b87a98
                                                                        • Opcode Fuzzy Hash: 0f5f95ef50a7c1f0e1ecfbc6833c40f3243e6e7978d576749428808ead162dab
                                                                        • Instruction Fuzzy Hash: 110149753083845FD3215BA8E804A5A7FB5EFC3360F1081ABE085CB396CA388806C7B1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 233d516ebcddd1c03d20d384c7e1e18fa81f50fe243c8dae78259e0724d2ea82
                                                                        • Instruction ID: 3bdb05d0f24da4469409f7aa4d110f4c61d8e217e132b81f7637daabf2421e2f
                                                                        • Opcode Fuzzy Hash: 233d516ebcddd1c03d20d384c7e1e18fa81f50fe243c8dae78259e0724d2ea82
                                                                        • Instruction Fuzzy Hash: 600196763516024BF7549728C848AB933D6FB86334F184675E455C73E1CA24D802C691
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 68dad57acbb0e76af881c38696e2493bffd27b68413952edcf1b3759570ce31f
                                                                        • Instruction ID: 5eb0ea3ca251ce287a54dbee6e9267f10aed58a5bfe93693869ac30b02a2de2e
                                                                        • Opcode Fuzzy Hash: 68dad57acbb0e76af881c38696e2493bffd27b68413952edcf1b3759570ce31f
                                                                        • Instruction Fuzzy Hash: 2A01F5723106024FF765CB28D888BB937E2FBC9220F1841B6D845CB3E2CA24DC02C791
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ebea68788f8398cd05a2b4d19986a6a6e96e5a2eeaf39ad04915d42619ca2da6
                                                                        • Instruction ID: 8f658711be21b1ba0100a75d4d7fb3c10b9d5b8c23d16d6b9d04b40d31f299ce
                                                                        • Opcode Fuzzy Hash: ebea68788f8398cd05a2b4d19986a6a6e96e5a2eeaf39ad04915d42619ca2da6
                                                                        • Instruction Fuzzy Hash: F0111B34210A41CFD751DB78D494FA97BE0BF46214F0549AAE2AACB775D770EC058BA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3ad321a2a6f3cf1b1929912b7f3e669cc881d3136415f504899a9ffafd600a09
                                                                        • Instruction ID: 9e93a6323ecc053884811fc45750fb1ecdbdac4c685d6a17ffa854d6c4679232
                                                                        • Opcode Fuzzy Hash: 3ad321a2a6f3cf1b1929912b7f3e669cc881d3136415f504899a9ffafd600a09
                                                                        • Instruction Fuzzy Hash: AC010574210A01CFD750EB68C484BA9B7E4BB09214F14496AE2AACB770D770E8048BA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f85a82570c907017d8dfe0cbc43edf7da542ba2afe57288f07a5d06c8734a3a1
                                                                        • Instruction ID: c2697b33711a220b5f306402f148bbd40611bf4ded79165cc188eb6b05d7ef43
                                                                        • Opcode Fuzzy Hash: f85a82570c907017d8dfe0cbc43edf7da542ba2afe57288f07a5d06c8734a3a1
                                                                        • Instruction Fuzzy Hash: B3014C75A042449FCB11EF68D4948DEBFB8EFC6310700019BE145DB321DB305D09C7A1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 38c3aa0fe2edf6e6e47af33482e6d9d26c7487af8b2ed196cc900d302c63d9ea
                                                                        • Instruction ID: 6ab564559e1a9e852d351fdc54d1f4f5e0313f3c3931a693955f0d300d7b786c
                                                                        • Opcode Fuzzy Hash: 38c3aa0fe2edf6e6e47af33482e6d9d26c7487af8b2ed196cc900d302c63d9ea
                                                                        • Instruction Fuzzy Hash: DFF0BE342053846FC3155BA4E809C977FB9EB82260B15C16AF5458B3A2CA39C802C7B1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5d251be3bc3e84de94921d1c6fa95e94f2b214318615b6bf33ce70fb17fd1be7
                                                                        • Instruction ID: e08915a86841b29a270e158bbfeaaf3f29e1c34f9b53ac3cf781ce96cd60f66e
                                                                        • Opcode Fuzzy Hash: 5d251be3bc3e84de94921d1c6fa95e94f2b214318615b6bf33ce70fb17fd1be7
                                                                        • Instruction Fuzzy Hash: 56F0A470808398AFCB12DFB8D80069DBFF0AF0A320F1446E9D8D4EB252D3311510DB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab0833cfe5534daafb6ca0bc0ec4d408a26bfc535c022ac57c4c692dec8f9cc4
                                                                        • Instruction ID: 5f84d16b4e8d52e826686203043360a5894a3a18ea6c84a8b74331f4379ab202
                                                                        • Opcode Fuzzy Hash: ab0833cfe5534daafb6ca0bc0ec4d408a26bfc535c022ac57c4c692dec8f9cc4
                                                                        • Instruction Fuzzy Hash: 78F09070104B028FD329CB56C554961BBF0EF46714B19C8AFD48E87AB2C630B841CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f1f73b5081ce5f82e96bd6416859aebe538284ffad7cbb81074063de29a27ff9
                                                                        • Instruction ID: 18d00735674dd53700749daf46e1ae4ffd14842108797467e4d3d75a86bfbd16
                                                                        • Opcode Fuzzy Hash: f1f73b5081ce5f82e96bd6416859aebe538284ffad7cbb81074063de29a27ff9
                                                                        • Instruction Fuzzy Hash: FAF03074D153449FDB91DFB8D444589BFF0AB06224F1082EAD894DB2A2D7315541DF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 86ff830c10aa17ef090d92dde6fadf0d7baa3b321aab105164b0983b313acd15
                                                                        • Instruction ID: ff5577387797378e3133ffec5f9750b047207dc0bc89b123f4c18710e4c81903
                                                                        • Opcode Fuzzy Hash: 86ff830c10aa17ef090d92dde6fadf0d7baa3b321aab105164b0983b313acd15
                                                                        • Instruction Fuzzy Hash: A4E0D8F0B15621CBA31A6739540026EF1857F4AA34F100B7E64169F7D4C932DC4283C0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a7aae49609e330292877708353dc18a0fb1f983242473aee785944c4e2ffd82f
                                                                        • Instruction ID: 9beeaaae2d01419a0cf4c0748406ef1161fd91483181e51b31485e153b6a74a5
                                                                        • Opcode Fuzzy Hash: a7aae49609e330292877708353dc18a0fb1f983242473aee785944c4e2ffd82f
                                                                        • Instruction Fuzzy Hash: 82F0E570C09348EBD755EBB8A80429DBBF4AB06315F1043F9D560573C1D3354A06DAE2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2033b704d5c66374b98445b4d89d6c1d450aec33bbcb5b401df675406b8ac18a
                                                                        • Instruction ID: c340c119c123edd658b17e3ddad87158ae17061fecdc6efcf3c8caf379789577
                                                                        • Opcode Fuzzy Hash: 2033b704d5c66374b98445b4d89d6c1d450aec33bbcb5b401df675406b8ac18a
                                                                        • Instruction Fuzzy Hash: 5BE04FF2F066219BD76A6A24A44235AF796AF49A64F15427ED40ADF380D622CC8283C0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a7406bf55f2c8e25420d87172374f4d5d138c30da457c59463d9245aec6da4ef
                                                                        • Instruction ID: 4685b75544356b2b544c9767d269459c89675e335c466e526cc58eff17999d69
                                                                        • Opcode Fuzzy Hash: a7406bf55f2c8e25420d87172374f4d5d138c30da457c59463d9245aec6da4ef
                                                                        • Instruction Fuzzy Hash: 83E06D70D19348AFD706EFB0A81439EBFB0AB01304F1082EAC80897392D7398A05CF92
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b9a0256f55a2344af97e5ed966817b1254d33431c70b085692d4dc877af00372
                                                                        • Instruction ID: b80091e939d129f0dfa727033cd6a00236d6c328c0f8d510e221de483eae3a7c
                                                                        • Opcode Fuzzy Hash: b9a0256f55a2344af97e5ed966817b1254d33431c70b085692d4dc877af00372
                                                                        • Instruction Fuzzy Hash: 31E06DB1D04218AFD700DFA8D44675D7BF4EB09309F0051E5D40493350D7369A048E81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0e9795cabb16fc96104c7cfa2bf1c79cbadf28e345f09ff4b2aec7a73b10970e
                                                                        • Instruction ID: 406b0c907d58cafa24b851e13a71d2e4f8b67dc38cd8fabe5c0290bae98a36b9
                                                                        • Opcode Fuzzy Hash: 0e9795cabb16fc96104c7cfa2bf1c79cbadf28e345f09ff4b2aec7a73b10970e
                                                                        • Instruction Fuzzy Hash: 61E0C2B4E01208AFDB80DFA8D48978DBBF0EF08355F1181A9D918D73A0E7358A518F41
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c150058ee807cdef38d9f46863705779fbf50f2cce4e687a41ffef1e087be66
                                                                        • Instruction ID: 79a17202f9d6bd471f8ccc3cf40bcbea337409edeb8f611ab3afadd1a5396742
                                                                        • Opcode Fuzzy Hash: 4c150058ee807cdef38d9f46863705779fbf50f2cce4e687a41ffef1e087be66
                                                                        • Instruction Fuzzy Hash: 83F0F8B5C05218AFDB41DFE4D9447ADBFB0FB08311F1186A9E918E3251D7308651DF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d200708cbde800d57222b64ca80bf2119a3679558656db85004e04199a5df48b
                                                                        • Instruction ID: c8ebc5254e52c92aa0774c96d7fc58fa95160685651f881f591fb9ba8e6a0ac5
                                                                        • Opcode Fuzzy Hash: d200708cbde800d57222b64ca80bf2119a3679558656db85004e04199a5df48b
                                                                        • Instruction Fuzzy Hash: C2E092B0C00108ABEB04EBA4D8097CDBBF0EB04315F5012A9C40497340E73097818B81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 67ddc882d5bc8ea36f2764373218a8ba99f89e85c0b7e19b327d20a2e00b0a57
                                                                        • Instruction ID: 86e9aed3330763baa63f65c5590adc15e3f944dae929bb1551e41da2ee0d2ef5
                                                                        • Opcode Fuzzy Hash: 67ddc882d5bc8ea36f2764373218a8ba99f89e85c0b7e19b327d20a2e00b0a57
                                                                        • Instruction Fuzzy Hash: 0FF06D70914208AFD740EFA8E845B5EBBB4FB48305F1181E9D904A73A1D731EA05CF82
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2276f694e7cea3296be3dceb37a44a3e0fe018198942df339265ee62017ad5fa
                                                                        • Instruction ID: b7c01e0e0add344eb3c0e20ec81b4ce3a1b3934a037a844ea88fefaa28043493
                                                                        • Opcode Fuzzy Hash: 2276f694e7cea3296be3dceb37a44a3e0fe018198942df339265ee62017ad5fa
                                                                        • Instruction Fuzzy Hash: 3BE04F70D1A284EFD715AF74A4543997FB0AB02205F2506EAC484C7151DB354A46DB92
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 85237f5d6bf81c3fad30b7cdbf1c8c48f295c85d8ef1b8ac4e9c1e2c5e75fdff
                                                                        • Instruction ID: a9e38a86614592f1b1be0f161f96467ff4dec5c419274666ef73cbb177ef909d
                                                                        • Opcode Fuzzy Hash: 85237f5d6bf81c3fad30b7cdbf1c8c48f295c85d8ef1b8ac4e9c1e2c5e75fdff
                                                                        • Instruction Fuzzy Hash: 3AF0A535D04208EFCB54DFA8D841A9DBBB1EB48304F10C1AAAC1893350D732AA51DF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5e8fa1582d68ca2b6a0844ef7fc796c7e6a823c60934c9e595398f3ae1e58344
                                                                        • Instruction ID: 6dce4afef543e460ca3721e7871c61d20da79c0ae336454fe5b8eac1c18597da
                                                                        • Opcode Fuzzy Hash: 5e8fa1582d68ca2b6a0844ef7fc796c7e6a823c60934c9e595398f3ae1e58344
                                                                        • Instruction Fuzzy Hash: 78D02BBAB0412413D320212E14046AF67CE4BD0622F09056FE015872C18C55880192D5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 58fd0d639c08b0a96e59d558ce5ebacbbfbbd994234eca5740de7e969e3401f2
                                                                        • Instruction ID: 2dd201832727e724fec881f51703389add05f5bc7aa62e1b11dc9e0efff1b117
                                                                        • Opcode Fuzzy Hash: 58fd0d639c08b0a96e59d558ce5ebacbbfbbd994234eca5740de7e969e3401f2
                                                                        • Instruction Fuzzy Hash: AFE04FB390022CBFEF115F84D845BDB3F98EB11764F194166F6086B191C373A4629BE2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e87678310f0ddb0bba3a1f4a2caeedc98180306d61b93159b83b8401fd34ce22
                                                                        • Instruction ID: a9e357bf3dc7ac812e5e3e98ed7fbdf745bce7e9efaba9ee49e9deb93d6ff743
                                                                        • Opcode Fuzzy Hash: e87678310f0ddb0bba3a1f4a2caeedc98180306d61b93159b83b8401fd34ce22
                                                                        • Instruction Fuzzy Hash: D0E09270D09244AFC745EBB4A81539CBFB0EB46304F1082FAD44493281D7394A41CF82
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c42bbc91ad7427437578556e4d153082f12510f1edf1f21b147a8e26ab9b08c9
                                                                        • Instruction ID: 8f683edce5b4f5e4a7fb0e7c4785c7c34ca1fe5b262e5d261959f2b6f2eabcf9
                                                                        • Opcode Fuzzy Hash: c42bbc91ad7427437578556e4d153082f12510f1edf1f21b147a8e26ab9b08c9
                                                                        • Instruction Fuzzy Hash: 7FD0A736354224A36608737E94548DFB2DEBBC65357404E3AE209C3F60DDA09D0642E2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9557d4b3ad6b8f76710d8fae4196d144533880b72e789c58a806248b9a46ef31
                                                                        • Instruction ID: 19550314e496c9fe843a15407522316968a3d4a74555698f86ab0c40b6882ac7
                                                                        • Opcode Fuzzy Hash: 9557d4b3ad6b8f76710d8fae4196d144533880b72e789c58a806248b9a46ef31
                                                                        • Instruction Fuzzy Hash: 03E09AB0C04208AFD754EBB4D84135EBBB0EB44309F1082FEC404A3281D7359A00CB82
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f37d07f9698c6ad38e61c8e0302f08c9acb79917e9680a69b04ac2d217a22697
                                                                        • Instruction ID: add9a6140077724f2852ead0dd761f911a4f648114a8818dd8c61b556dbdf1b3
                                                                        • Opcode Fuzzy Hash: f37d07f9698c6ad38e61c8e0302f08c9acb79917e9680a69b04ac2d217a22697
                                                                        • Instruction Fuzzy Hash: 72E0C974D0021DAFCB44EFA8D8456ADBBB1FB48311F0086A9E854A3350D7715650DF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: edfa544aa3b78f4ae925d4e83914ef362fbb4a9a962f3aed2aecfc05593023ca
                                                                        • Instruction ID: c22f9432c0732ec47ee3315c7f632a7e39ca70f86bf46a59e0d2ac55d3308ddb
                                                                        • Opcode Fuzzy Hash: edfa544aa3b78f4ae925d4e83914ef362fbb4a9a962f3aed2aecfc05593023ca
                                                                        • Instruction Fuzzy Hash: 90E0A5B4D00218AFCB44EFA8D9047ADBBB4FB48310F1086A9E914A3251D7715650DF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c76de3a528a9f438b277041817560f070fbd2bdf2942cf61163111e9f090a84c
                                                                        • Instruction ID: 92248601ce4aa671d66e0a5114085e8fa87862ada539fe6e3cea76ad74bc6854
                                                                        • Opcode Fuzzy Hash: c76de3a528a9f438b277041817560f070fbd2bdf2942cf61163111e9f090a84c
                                                                        • Instruction Fuzzy Hash: F5E0E534E15208EFCB40DFA8D445A9CBBF0EF48304F5081EAD80893311D730AA40CF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8284a8b6fd24e6a7bcab63041bbcd4963ed43e548914614d41e6757d5bced2df
                                                                        • Instruction ID: 9618970e85f88ecb799f98233611aa20e90252867f79da9970c7fde9d5628060
                                                                        • Opcode Fuzzy Hash: 8284a8b6fd24e6a7bcab63041bbcd4963ed43e548914614d41e6757d5bced2df
                                                                        • Instruction Fuzzy Hash: 37E09A74E15208EFCB94DFA8D54569DFBF4EB88304F14C1EA981893341D735AA42CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91bb71aa90efe1490feec8326a012972c42f5b5752d4bdb826d6a338ea1fef4c
                                                                        • Instruction ID: d8d29f3db729fab77bb223eb28218f0011fe6788ecfb8133c9fab361d7fe1f84
                                                                        • Opcode Fuzzy Hash: 91bb71aa90efe1490feec8326a012972c42f5b5752d4bdb826d6a338ea1fef4c
                                                                        • Instruction Fuzzy Hash: E2E09A74E10208AFC780DFA9D44465DBBF4FB08615F0081EAD808D7360E7359A40CF41
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5daf7f4d53a37c401f7d65a55da35b0864944f6f9e237bf57b9e7d2eff5ccbbd
                                                                        • Instruction ID: 33097984b08b492ad2a820a830ad89b76e2214054f2468889a4b44649fc0218a
                                                                        • Opcode Fuzzy Hash: 5daf7f4d53a37c401f7d65a55da35b0864944f6f9e237bf57b9e7d2eff5ccbbd
                                                                        • Instruction Fuzzy Hash: 7BE0B674E24208AFC784EFA8E444A5DBBB4FB49315F1182E9D80897360D7319A41CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2851a238a08130b11f24786577c7791a5e7d8ad300c2362c53a79c3e97693332
                                                                        • Instruction ID: 0bac714e2124ddbf1d8a472ed5864a9bc30f62c41b33ee4ea1be9ece10a00574
                                                                        • Opcode Fuzzy Hash: 2851a238a08130b11f24786577c7791a5e7d8ad300c2362c53a79c3e97693332
                                                                        • Instruction Fuzzy Hash: 26E012B0914218AFC744DFA8E408A5DBBF4AB4A306F0081EAE80897360D7319A40CA91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d4ddd412efb793c71b7f504999e75887c8c3b8f83a8b4144a44310de6bc77fd6
                                                                        • Instruction ID: 1fc95bcc32598c6f6839b8c92cd15527b1f00f6a67191520d4df578acd2b4096
                                                                        • Opcode Fuzzy Hash: d4ddd412efb793c71b7f504999e75887c8c3b8f83a8b4144a44310de6bc77fd6
                                                                        • Instruction Fuzzy Hash: E7E04671904608AECB80EFB8D4481AD7FF4BB11220F00CA3AE80CCA001EA31C2D69FD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 95d2d2b8ec7677d35aeabe47e8dee897837924d3693a815c45e564530220c945
                                                                        • Instruction ID: b3c555d4a2972aae09d4cf91a9d9059c210ab3c1df977d96faff67abc8de2fa2
                                                                        • Opcode Fuzzy Hash: 95d2d2b8ec7677d35aeabe47e8dee897837924d3693a815c45e564530220c945
                                                                        • Instruction Fuzzy Hash: C6E0BFB0F0010ACBEF19DA94D8587FEB3B5FB85314F1082594515673D4DA385942CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 13c12a6c45fff4a799877ccda28057ad0dbbc8daff714cb91ce2bb4df30e0188
                                                                        • Instruction ID: 280452b6f311906a371dda4a50272a810c4a7e699949d2bc8c0a28a005edcb09
                                                                        • Opcode Fuzzy Hash: 13c12a6c45fff4a799877ccda28057ad0dbbc8daff714cb91ce2bb4df30e0188
                                                                        • Instruction Fuzzy Hash: 44E092B4E11208EFCB80DFA9D445B9DBBF4EB08215F0081EAD909D7360E7359A50CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 003d34ab76364ac3675ddb611992dea1bd10381ac11bc536af0526122daa4416
                                                                        • Instruction ID: 68570efce8b7bb0fcaf033405d5909ad9ecaa46340fc0e1e47776b69fefc33b9
                                                                        • Opcode Fuzzy Hash: 003d34ab76364ac3675ddb611992dea1bd10381ac11bc536af0526122daa4416
                                                                        • Instruction Fuzzy Hash: 06E0BF706092858FD3098B2C9409341BFA07F56314F0441DBA554CE243E7BAD5C4DBE5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 99e929bc998d7d57837f5363f5e68d247639bd07c3531b2ae0a5ab66c9267e8b
                                                                        • Instruction ID: 7073577d20e8b9411170bd16c789994042fddae4dbfc5099cf005d50499e6a33
                                                                        • Opcode Fuzzy Hash: 99e929bc998d7d57837f5363f5e68d247639bd07c3531b2ae0a5ab66c9267e8b
                                                                        • Instruction Fuzzy Hash: 83E0C23185910CEFD710EFF0E4047AE7BE8EB45205F0000E9C00A93220DF314F048BA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.346351421.000000000AEE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_aee0000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24bde0a02c717ac724596c6a47f7be801066905bd96b235647018324be483bc9
                                                                        • Instruction ID: 358faf16bbdb8186faa3cfe9692a0eabedef885ef06ebc8d70aa67073c6096b2
                                                                        • Opcode Fuzzy Hash: 24bde0a02c717ac724596c6a47f7be801066905bd96b235647018324be483bc9
                                                                        • Instruction Fuzzy Hash: C5E09274E1520CEFCB54EFA8E54969DBBF4EB88305F5081EA9819A3351D734AA40CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: db015e9c979bb5c9bf10d5509099ee0bd3202b535e991330697d90a5dee4e25a
                                                                        • Instruction ID: c66b6aaf3b26557c2d9392ab42a69d6d7e119851aeef742ca8a0c42632703ee9
                                                                        • Opcode Fuzzy Hash: db015e9c979bb5c9bf10d5509099ee0bd3202b535e991330697d90a5dee4e25a
                                                                        • Instruction Fuzzy Hash: 77E08C70D00208AFCB44EFF8E808B9CBBF4EB04218F5002E9C80897340EB319B858B82
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 723780a68f6dc0181124c2800412dfe66b636ff89164d11f1f85cf15c9b0c29f
                                                                        • Instruction ID: b390a99a428dc5645d9370fde2aab538dc0bc6879ad5f4d88c1788bb23d62e54
                                                                        • Opcode Fuzzy Hash: 723780a68f6dc0181124c2800412dfe66b636ff89164d11f1f85cf15c9b0c29f
                                                                        • Instruction Fuzzy Hash: 81C08077704138135625316F24144BFA7CF4EC5A72615457FF509873C59DA58C0192E5
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 553459418de41b33acd1727935678353e1246953500d107a9e71991e776d5616
                                                                        • Instruction ID: bd813baea6176f1ac3c3b18ab5b811344683e8adfde4adfca21914a7b968f0f1
                                                                        • Opcode Fuzzy Hash: 553459418de41b33acd1727935678353e1246953500d107a9e71991e776d5616
                                                                        • Instruction Fuzzy Hash: F6E0EC70D05208EFD754EFB4E50469DB7B5FB44305F1082B9C80493340D7359A41CF81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d643bed68686bf9e405f3ebe990a64cbf96f0b7d2f29289e0bd407f7ec4c631f
                                                                        • Instruction ID: eeb243a0e02466d72326e8861333eaefb61d7cb1b8e5c2cc81fbefc9eae340bc
                                                                        • Opcode Fuzzy Hash: d643bed68686bf9e405f3ebe990a64cbf96f0b7d2f29289e0bd407f7ec4c631f
                                                                        • Instruction Fuzzy Hash: 2AE0EC70D05208EFD754EFB8E44569DB7B5EB45305F1082BED81493280D7359A41CB85
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cdf946ca5a9f1d5c0646115dd7637fb7e4ef8faeaefd4ce66063665fb281c10b
                                                                        • Instruction ID: 2ee80d6cb62e31b4fecc432bfc9bae66b84e2642166119b62fd49275edf143b3
                                                                        • Opcode Fuzzy Hash: cdf946ca5a9f1d5c0646115dd7637fb7e4ef8faeaefd4ce66063665fb281c10b
                                                                        • Instruction Fuzzy Hash: D9D05E1121E2A01BD70673A8A0201E8BF698B47524B0940DBC1C98B193C8850C4283EA
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d3c8007ab4555413d848c125be9b9791151e125a08e1e9e2e504a5252d0cd0c9
                                                                        • Instruction ID: e7cda1f409e97650c8dc96c83a41c113ea40eb8457fa244f1f88ccdff17d2812
                                                                        • Opcode Fuzzy Hash: d3c8007ab4555413d848c125be9b9791151e125a08e1e9e2e504a5252d0cd0c9
                                                                        • Instruction Fuzzy Hash: 69E0EC70D05218AFD754EFF4A8152ADBBF4AB49315F1082E9D41853240DB358A54DB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 35cd384bd4f5d18cbe73b872ce6506c0538e42ee5dddcc66a676871b6d58dd1f
                                                                        • Instruction ID: 5db4838b7e6343dea4dea2b889f249657d94a57df832f721875b789b9c25b3fd
                                                                        • Opcode Fuzzy Hash: 35cd384bd4f5d18cbe73b872ce6506c0538e42ee5dddcc66a676871b6d58dd1f
                                                                        • Instruction Fuzzy Hash: 34E0ECB0D05218EFD755EFB8A50439DBBF4BB45305F1082E9D45853384D7358A54DA81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d350e571d8fe5a553a2872f3a0af989435bdc0590c6ea7609f5b808718db0373
                                                                        • Instruction ID: 17570ed91f6c09b2cfb0108be983d1de1b347705ab3310525db0def53d7e59e7
                                                                        • Opcode Fuzzy Hash: d350e571d8fe5a553a2872f3a0af989435bdc0590c6ea7609f5b808718db0373
                                                                        • Instruction Fuzzy Hash: 99E0EC7191460CADDB80EEB4D5445A97BE8AB15220F40C63AE80CDA100EA31D2959B91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ef71177fc3962cce3ec72dcb87ad85865cad8078f636c84e34872c085173d273
                                                                        • Instruction ID: 04da039e6b6a7f11a8f6205bc5b0bdb76f23b42e45e0a7e10ac89633eab397a4
                                                                        • Opcode Fuzzy Hash: ef71177fc3962cce3ec72dcb87ad85865cad8078f636c84e34872c085173d273
                                                                        • Instruction Fuzzy Hash: DDE08C7280022CBFDF119F448844BDB3F58EB01360F144066FA082E052C373A86297E0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7dba85db6edab95ec28f7dffb73b6e2e7caf8e85f68cd23fe9fe48a6d103b956
                                                                        • Instruction ID: 0521e82f83307dd0140d6de3ac410bee7f36a4b3d40ecf35215530e3dffca37c
                                                                        • Opcode Fuzzy Hash: 7dba85db6edab95ec28f7dffb73b6e2e7caf8e85f68cd23fe9fe48a6d103b956
                                                                        • Instruction Fuzzy Hash: F9D05E70921208AFD744EFB4A80439E7BB8AB00249F5002B9C80453280EB328A84CA91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5a2dd600d83e472db77ae2fe11f6f2f044136429b32de65ac50fd01d75011647
                                                                        • Instruction ID: 5ea7d4ef872d17248e931c1b9aff204e187462c0b07b5322af0e5ece3d7673bf
                                                                        • Opcode Fuzzy Hash: 5a2dd600d83e472db77ae2fe11f6f2f044136429b32de65ac50fd01d75011647
                                                                        • Instruction Fuzzy Hash: 19D0A72131C2A407C3162268A4100593F8AEB4A61571400FBE586C7A42D9950C4143DB
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 81833cac3475ebb2c25985ee40eba202151f680d842e5a6095358dae299055d4
                                                                        • Instruction ID: cb9116885e8bff2f502de6a482d03c62d8e23070e8db78a54e936efa6cc54855
                                                                        • Opcode Fuzzy Hash: 81833cac3475ebb2c25985ee40eba202151f680d842e5a6095358dae299055d4
                                                                        • Instruction Fuzzy Hash: 86D0C934280108EFD700AF14D444C997766FF25366F518552F9494B731CB31E811DAD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98f820241f2dae4ac198bb66cc1f05c82797a999bcf61825980818373ba007cc
                                                                        • Instruction ID: 741722d130307177878efd06050029f70f2a1b4224b99c681dcd793013e28e71
                                                                        • Opcode Fuzzy Hash: 98f820241f2dae4ac198bb66cc1f05c82797a999bcf61825980818373ba007cc
                                                                        • Instruction Fuzzy Hash: E8C08C3132013803C6082198B0001AD368E8788625B000027A60A837404DE50C0003DF
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7a87cf3b4c5bc25b61d137d636e02b1dca1bafba0fa08e386c48f2a541d4ef1c
                                                                        • Instruction ID: 1f6137a6cc56e2193d05bb16e655bba4f091b065be9048a728657a41bde7c95f
                                                                        • Opcode Fuzzy Hash: 7a87cf3b4c5bc25b61d137d636e02b1dca1bafba0fa08e386c48f2a541d4ef1c
                                                                        • Instruction Fuzzy Hash: 8EB09B2133413417D508319DB4115ED758D87C5975F44017B950D977815DD55D4102DF
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: caa429cd835c215b6140503888ceedabc1f2295ce094c98ec21bc23fa25d9da0
                                                                        • Instruction ID: 427d31f625cb66415fc4eedb16d144aa1032a6d55482bbfd450e83d15960903f
                                                                        • Opcode Fuzzy Hash: caa429cd835c215b6140503888ceedabc1f2295ce094c98ec21bc23fa25d9da0
                                                                        • Instruction Fuzzy Hash: 96D012619083808FC3227B259524485BF30FEB7300706539B88C085092E65506A8C752
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 690542d96f245a9c6cf6eacb6216c62f926df463394cb3fee41d3481cc4ffe55
                                                                        • Instruction ID: c63342ad5b4a0c38ba8fd0e1f6eef23769be14deaa9c8fc248bbd769a4d67a65
                                                                        • Opcode Fuzzy Hash: 690542d96f245a9c6cf6eacb6216c62f926df463394cb3fee41d3481cc4ffe55
                                                                        • Instruction Fuzzy Hash: CEC08CA1624708CDE220FB3886004DDB774FF17200F80CF1BE08162360EF2091A886E3
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.343347918.0000000007000000.00000040.00000800.00020000.00000000.sdmp, Offset: 07000000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7000000_remcos.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 462ffc8e003c32e29b895154d546028fa92b191a2dae4dba46aa27ed8122b88c
                                                                        • Instruction ID: 01c31a5df55db40807aae718e0bed4451d1695f451d8199a7357e9222b6e8aaa
                                                                        • Opcode Fuzzy Hash: 462ffc8e003c32e29b895154d546028fa92b191a2dae4dba46aa27ed8122b88c
                                                                        • Instruction Fuzzy Hash: 79B012BE258100FAF20533A04425F9FE101BB92F28F01AD063304146E08961D410D1EB
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%