Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fatura.bat.exe

Overview

General Information

Sample name:fatura.bat.exe
Analysis ID:1435905
MD5:60343e738c518f3ba896eae58ca1d71c
SHA1:1f8db86a369116a6e9d95c62255ef37aa7070e11
SHA256:6703df15130444806d68473d071445cfe26efb0570f06df656711a74d18264f6
Tags:batexe
Infos:

Detection

Remcos, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • fatura.bat.exe (PID: 6816 cmdline: "C:\Users\user\Desktop\fatura.bat.exe" MD5: 60343E738C518F3BA896EAE58CA1D71C)
    • powershell.exe (PID: 6700 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7440 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 6788 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • fatura.bat.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\fatura.bat.exe" MD5: 60343E738C518F3BA896EAE58CA1D71C)
    • fatura.bat.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\fatura.bat.exe" MD5: 60343E738C518F3BA896EAE58CA1D71C)
  • KGuxmqSTXgJca.exe (PID: 7404 cmdline: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe MD5: 60343E738C518F3BA896EAE58CA1D71C)
    • schtasks.exe (PID: 7588 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • KGuxmqSTXgJca.exe (PID: 7632 cmdline: "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe" MD5: 60343E738C518F3BA896EAE58CA1D71C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "sembe.duckdns.org:14645:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-999Z97", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "nots.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\note\nots.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1669557632.0000000005C10000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 17 entries
              SourceRuleDescriptionAuthorStrings
              8.2.KGuxmqSTXgJca.exe.2b78f50.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.fatura.bat.exe.5c10000.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.fatura.bat.exe.5c10000.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.fatura.bat.exe.32c9b80.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.fatura.bat.exe.32c9b80.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 35 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fatura.bat.exe", ParentImage: C:\Users\user\Desktop\fatura.bat.exe, ParentProcessId: 6816, ParentProcessName: fatura.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", ProcessId: 6700, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fatura.bat.exe", ParentImage: C:\Users\user\Desktop\fatura.bat.exe, ParentProcessId: 6816, ParentProcessName: fatura.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", ProcessId: 6700, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe, ParentImage: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe, ParentProcessId: 7404, ParentProcessName: KGuxmqSTXgJca.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp", ProcessId: 7588, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\fatura.bat.exe", ParentImage: C:\Users\user\Desktop\fatura.bat.exe, ParentProcessId: 6816, ParentProcessName: fatura.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", ProcessId: 6788, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\fatura.bat.exe", ParentImage: C:\Users\user\Desktop\fatura.bat.exe, ParentProcessId: 6816, ParentProcessName: fatura.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe", ProcessId: 6700, ProcessName: powershell.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\fatura.bat.exe", ParentImage: C:\Users\user\Desktop\fatura.bat.exe, ParentProcessId: 6816, ParentProcessName: fatura.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp", ProcessId: 6788, ProcessName: schtasks.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Registry Key setAuthor: Joe Security: Data: Details: CC C0 05 F8 36 77 FD 59 3D 3F 59 CE EA 6B 35 F4 2A 51 DF 7F E7 F9 A2 6A A8 65 6F 05 8D 94 B4 E7 81 F1 E2 17 2D A1 AD 1D C4 9E 70 18 44 5C 31 79 90 E1 F3 0E 01 23 C7 2A 07 82 17 BA A8 87 A6 1F E0 3B 73 83 B6 E7 0C 1D 96 DD 0F B7 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\fatura.bat.exe, ProcessId: 7300, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-999Z97\exepath
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                        Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                        Source: sembe.duckdns.orgAvira URL Cloud: Label: malware
                        Source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "sembe.duckdns.org:14645:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-999Z97", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "nots.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                        Source: sembe.duckdns.orgVirustotal: Detection: 11%Perma Link
                        Source: sembe.duckdns.orgVirustotal: Detection: 11%Perma Link
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeVirustotal: Detection: 38%Perma Link
                        Source: fatura.bat.exeVirustotal: Detection: 38%Perma Link
                        Source: fatura.bat.exeReversingLabs: Detection: 39%
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 7300, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\note\nots.dat, type: DROPPED
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeJoe Sandbox ML: detected
                        Source: fatura.bat.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00433837
                        Source: fatura.bat.exe, 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_8c1aa95f-d

                        Exploits

                        barindex
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004074FD _wcslen,CoGetObject,12_2_004074FD
                        Source: fatura.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: fatura.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409253
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C291
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C34D
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409665
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_0040880C
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040783C FindFirstFileW,FindNextFileW,12_2_0040783C
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419AF5
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB30
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD37
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407C97

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: sembe.duckdns.org
                        Source: unknownDNS query: name: sembe.duckdns.org
                        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 194.187.251.115:14645
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                        Source: Joe Sandbox ViewIP Address: 194.187.251.115 194.187.251.115
                        Source: Joe Sandbox ViewASN Name: M247GB M247GB
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,12_2_0041B380
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: global trafficDNS traffic detected: DNS query: sembe.duckdns.org
                        Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                        Source: fatura.bat.exe, KGuxmqSTXgJca.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                        Source: fatura.bat.exe, KGuxmqSTXgJca.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                        Source: fatura.bat.exe, 00000007.00000002.4069720580.0000000000F35000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069720580.0000000000F27000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, KGuxmqSTXgJca.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: fatura.bat.exe, 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, KGuxmqSTXgJca.exe, 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                        Source: fatura.bat.exe, 00000000.00000002.1671869767.0000000007868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.co
                        Source: fatura.bat.exe, KGuxmqSTXgJca.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                        Source: fatura.bat.exe, 00000000.00000002.1665164596.00000000032F9000.00000004.00000800.00020000.00000000.sdmp, KGuxmqSTXgJca.exe, 00000008.00000002.1747777682.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: fatura.bat.exe, 00000000.00000002.1670045326.00000000062B0000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: fatura.bat.exe, 00000000.00000002.1671869767.0000000007868000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo
                        Source: fatura.bat.exe, KGuxmqSTXgJca.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,0000000012_2_0040A2B8
                        Source: C:\Users\user\Desktop\fatura.bat.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\fatura.bat.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B70E
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004168C1
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,12_2_0040B70E
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_0040A3E0

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 7300, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\note\nots.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041C9E2 SystemParametersInfoW,12_2_0041C9E2

                        System Summary

                        barindex
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_004167B4
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_013BD4240_2_013BD424
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07A86A000_2_07A86A00
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07A8AC800_2_07A8AC80
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07A8C2400_2_07A8C240
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07A800110_2_07A80011
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07A800400_2_07A80040
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D0A2080_2_07D0A208
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D02FD80_2_07D02FD8
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D02FC80_2_07D02FC8
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D034100_2_07D03410
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D02BA00_2_07D02BA0
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D04AE80_2_07D04AE8
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D038480_2_07D03848
                        Source: C:\Users\user\Desktop\fatura.bat.exeCode function: 0_2_07D000070_2_07D00007
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_00C8D4248_2_00C8D424
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_06F66A008_2_06F66A00
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_06F6AC808_2_06F6AC80
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_06F6C2408_2_06F6C240
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_06F600408_2_06F60040
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_06F6001F8_2_06F6001F
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_073393A88_2_073393A8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_07332FD88_2_07332FD8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_07332FC88_2_07332FC8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_073334108_2_07333410
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_07332BA08_2_07332BA0
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_07334AE88_2_07334AE8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 8_2_073338488_2_07333848
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043E0CC12_2_0043E0CC
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041F0FA12_2_0041F0FA
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0045415912_2_00454159
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043816812_2_00438168
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004461F012_2_004461F0
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043E2FB12_2_0043E2FB
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0045332B12_2_0045332B
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0042739D12_2_0042739D
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004374E612_2_004374E6
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043E55812_2_0043E558
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043877012_2_00438770
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004378FE12_2_004378FE
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043394612_2_00433946
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0044D9C912_2_0044D9C9
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00427A4612_2_00427A46
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041DB6212_2_0041DB62
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00427BAF12_2_00427BAF
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00437D3312_2_00437D33
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00435E5E12_2_00435E5E
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00426E0E12_2_00426E0E
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043DE9D12_2_0043DE9D
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00413FCA12_2_00413FCA
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00436FEA12_2_00436FEA
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: String function: 00434E10 appears 54 times
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: String function: 00402093 appears 50 times
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: String function: 00434770 appears 41 times
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: String function: 00401E65 appears 34 times
                        Source: fatura.bat.exeStatic PE information: invalid certificate
                        Source: fatura.bat.exe, 00000000.00000002.1665164596.0000000003261000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1665164596.0000000003261000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1664069466.00000000013CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1669277157.00000000059B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1671869767.0000000007868000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameschtasks.exej% vs fatura.bat.exe
                        Source: fatura.bat.exe, 00000000.00000002.1672997006.0000000007C30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs fatura.bat.exe
                        Source: fatura.bat.exeBinary or memory string: OriginalFilenameXwNY.exeX vs fatura.bat.exe
                        Source: fatura.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: fatura.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: KGuxmqSTXgJca.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, XG.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, DHpRnuiuxA6oksal3k.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, K15rpZAlZ8KJOtCk7n.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, K15rpZAlZ8KJOtCk7n.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@18/13@2/2
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00417952
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040F474
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041B4A8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AA4A
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7184:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7596:120:WilError_03
                        Source: C:\Users\user\Desktop\fatura.bat.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-999Z97
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2004:120:WilError_03
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAAA4.tmpJump to behavior
                        Source: fatura.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: fatura.bat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: fatura.bat.exeVirustotal: Detection: 38%
                        Source: fatura.bat.exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile read: C:\Users\user\Desktop\fatura.bat.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp"
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: riched20.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: usp10.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: riched20.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: usp10.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: fatura.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: fatura.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: fatura.bat.exe, Form1.cs.Net Code: LateBinding.LateCall((object)methodInfo, (Type)null, "Invoke", new object[2]{0,new string[3]{BN[0],BN[1],"VPBiblioteka"}}, (string[])null, (bool[])null)
                        Source: KGuxmqSTXgJca.exe.0.dr, Form1.cs.Net Code: LateBinding.LateCall((object)methodInfo, (Type)null, "Invoke", new object[2]{0,new string[3]{BN[0],BN[1],"VPBiblioteka"}}, (string[])null, (bool[])null)
                        Source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                        Source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                        Source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                        Source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                        Source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, DHpRnuiuxA6oksal3k.cs.Net Code: lUxfcPH9xxq5oPvfl06 System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, DHpRnuiuxA6oksal3k.cs.Net Code: lUxfcPH9xxq5oPvfl06 System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00457106 push ecx; ret 12_2_00457119
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0045B11A push esp; ret 12_2_0045B141
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00457A28 push eax; ret 12_2_00457A46
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00434E56 push ecx; ret 12_2_00434E69
                        Source: fatura.bat.exeStatic PE information: section name: .text entropy: 7.974179168934569
                        Source: KGuxmqSTXgJca.exe.0.drStatic PE information: section name: .text entropy: 7.974179168934569
                        Source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, XPbeWw2xeTnCbY5FfK.csHigh entropy of concatenated method names: 't0UL3U1d11', 'u9bLuMiqan', 'fAEbFrsAkt', 'qtAb4aS0Pg', 'XLFbIs3QpO', 'FrFbXigbCF', 'OUvbNaFKZW', 'dwabkfBghW', 'FrNbnXMAJa', 'QDybt7fDuT'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, TF6EtEZHTl5bsJN0a4.csHigh entropy of concatenated method names: 'YbI6ZsuPbo', 'Vux6OOkQDF', 'umd67juoqy', 'R846R7O1eJ', 'JwB6PYTXGA', 't7W6d7gRPy', 'cpA1YRwcEw5ryfLdb5', 'MQR4pBjcWwi94JP7hQ', 'hJ866kxMih', 'EFR6SHea3r'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, I38pUe6t7WXsXlogmy.csHigh entropy of concatenated method names: 'LbZh7IvgLd', 'Uj7hRc5YrJ', 'ToString', 'vOnhgjoZKS', 'DdOh86pOex', 'sXqhb3Sjkx', 'mYEhL2aSRJ', 'Gxbhj3sf0V', 'VjEhZ8tHnL', 'kTGhOHW0Yu'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, iEKcOvmtINUjNdIxUp.csHigh entropy of concatenated method names: 'YEjpcJDuij', 'YNgpJCxqcB', 'EktpD3e2DT', 'VifpTYwu1f', 'JPkp4y31ij', 'SvKpIAFPTX', 'tYlpNJ8QRn', 'rp2pk0pxIB', 'FtZpt6ANAC', 'BCqpvQBZhu'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, icnyvGRWc4iSEs6Z1i.csHigh entropy of concatenated method names: 'H8RKD6xNOr', 'OT5KTw7KK0', 'coQKF3s24a', 'b1XK4HUuWK', 'GFeK1aObn7', 'prrKIMQxUi', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, Tm4eY7SpNLngkW1jjR.csHigh entropy of concatenated method names: 'K76hUq5lsm', 'Tpvhwq4hNY', 'tknK9WDtkK', 'LyQK6pFkh6', 'uNShv3NsyM', 'oGchEMcjIL', 'guvhmyuNLw', 'ouJh12CEbH', 'XMkhGaVIjT', 'KlghsMGgyS'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, rs20SYxZyvheyqXEQd.csHigh entropy of concatenated method names: 'Dispose', 'rUZ6eNDpcb', 'biTqTFb5Fk', 'gDrQQkjKZJ', 'THH6wWJmbD', 'kda6zJCHYu', 'ProcessDialogKey', 'A2Mq94oKU0', 'OB9q698t0I', 'NYoqqVrhZ0'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, hJTloJFbXxZIRB6W0m.csHigh entropy of concatenated method names: 'LQTZ2bsDVd', 'X0lZoSwdVc', 'iVKZVXoL8E', 'smTZBSyliy', 'CHGZ3ndUNc', 'iGfZfIouXI', 'EIeZuo1Kcy', 'pfnZcBjYUG', 'auBZJY2eQh', 'ClHZCpVR2U'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, EeoSfFkThqBKXqmctb.csHigh entropy of concatenated method names: 'CjZY6aR67N', 'IgVYSAlgjK', 'T4dYHuLICW', 'THFYgUASdK', 'KTlY831LGu', 'vYaYLHyf9L', 'zJrYjGYiqt', 'clOKlJVKTQ', 'lL6KU9l9nr', 'MRGKeDtmex'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, fRpDGRElkLdWeLTLhB.csHigh entropy of concatenated method names: 'OEibBFFsfZ', 'pM8bflLXeD', 'S49bceYT2k', 'yAZbJlkJFc', 'eCubPap10G', 'lCBbdNIY37', 'plEbhOhRJM', 'rx3bKwmLHd', 'xBhbYbe1Lp', 'nrbb0OF9GN'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, KVi3Lnl1FN3s7CDXNX.csHigh entropy of concatenated method names: 'BDKPtQBw3k', 'cNZPEQIcV4', 'SppP1KCbyC', 'j5aPGWYTBQ', 'oeaPTTBSQj', 'fqoPFANRkq', 'LM1P4RuXEJ', 'jgHPIGpuB8', 'ulbPXcSh5S', 'iOfPNFiQlO'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, jGHOv18a5w8PjVVYwm.csHigh entropy of concatenated method names: 'UQCKgrM0Zl', 'DAiK8T1cks', 'gUqKb96Eq5', 'Sf4KLjONdO', 'fntKj4hkgb', 'CftKZUlZe1', 'SJ6KOGDrrW', 'eEiKibM7RL', 'HgxK7caJb3', 'MdAKRrcRmQ'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, oVGOujQOvPgAHZGkcq.csHigh entropy of concatenated method names: 'bnBZgxknjS', 'SfyZbtsfZK', 'qu6Zj0QNFr', 'n5qjwEFWNq', 'vLNjz5ULSB', 'IRiZ9GApnA', 'C3BZ6QqLh2', 'c2uZq23ip1', 'rkyZSIBgOP', 'cAcZHiOMHp'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, qbcoiMzUhP8f9tNdFP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qZPYpWxvl1', 'MTEYPio8Og', 'j8oYdgQ816', 'hj2Yh2mJOR', 'impYKEqRsq', 'QMJYYVH9AD', 'hY6Y0v9pFd'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, sT4fa64yY9KsZvBqo9.csHigh entropy of concatenated method names: 'wpXjM6xJSn', 'xX3j8modva', 'hQujLE0fnX', 'J9tjZRFVk7', 'LVujOVdgv5', 'K39L5ndqZD', 'GOoLAEkrHU', 'SXkLlk8QuJ', 'CNcLUh6EJq', 'KveLesSbH8'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, K15rpZAlZ8KJOtCk7n.csHigh entropy of concatenated method names: 'whN81YCwnn', 'mdA8GuofoU', 'gVQ8sB1huQ', 'bhe8r0jlaW', 'mfc85VTfVx', 'uIH8AWMYgE', 'utq8l1DAiM', 'rRx8UWxcrJ', 'gHq8eeINeO', 'vEv8wDm8Lb'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, YNnt5XuhXbQyUPQKYC8.csHigh entropy of concatenated method names: 'YDH02cE07u', 'I1s0oUrIT4', 'qX40VLxgq7', 'Olq9HDpgjHA5m1AHWjB', 'K9dG5SphOhA4J4LFR49', 'PD3x0vpQjfnYyLcwNMa', 'W6Tmijp8eUVdVMb6P7E'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, PPAA2g5X0KFLw0EIKA.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DM5qe0nLh9', 'Opiqw6Ba70', 'pPTqz5rqhl', 'rbLS9GJQdw', 'toAS6hhNFN', 'tsXSqYRWfm', 'twbSSFeTDw', 'w6fp5OHphsa8JNjSAk0'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, DHpRnuiuxA6oksal3k.csHigh entropy of concatenated method names: 'H58SMSgUdK', 'Ku1Sg53XVe', 'GakS8Vfme6', 'RVTSb8JXbj', 'ahHSL60ZC7', 't2oSjKiOcg', 'Lw3SZoQXvO', 'i2tSO22qvf', 'c9ESimGa5t', 'oYaS7KgrEu'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, pWmjVUuMrheMkybJUwo.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'a9001ungBD', 'ANq0GXQXB6', 'iF80sjk3tw', 'jym0rXXAN0', 'oQJ05REyjA', 'DyY0AkRcUm', 'Wjb0lpCrri'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, hQvpmRh1PYSBjv6EDa.csHigh entropy of concatenated method names: 'N8eVpvxaU', 'fpUB2ySOT', 't7If4t2MP', 'taVug4Uhb', 'SfMJApYdh', 'GZvC5Lwyu', 'iBuCqFPcck0tgSij0V', 'bsFXoMMHB5hSAYmH0B', 'f2AKfiLeM', 'aIJ01EpqG'
                        Source: 0.2.fatura.bat.exe.7c30000.8.raw.unpack, UUnZKquvEkfoZN3nqfZ.csHigh entropy of concatenated method names: 'qJlY2vB8b0', 'AuPYo6MBJ8', 'vBnYVFgPE7', 'iBxYBoBvY6', 'YMcY3EVe26', 'oNkYfsA5g6', 'AAWYuyh0fX', 'EGXYciuQ4m', 'fWlYJhGsu8', 'VIJYCm8M2f'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, XPbeWw2xeTnCbY5FfK.csHigh entropy of concatenated method names: 't0UL3U1d11', 'u9bLuMiqan', 'fAEbFrsAkt', 'qtAb4aS0Pg', 'XLFbIs3QpO', 'FrFbXigbCF', 'OUvbNaFKZW', 'dwabkfBghW', 'FrNbnXMAJa', 'QDybt7fDuT'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, TF6EtEZHTl5bsJN0a4.csHigh entropy of concatenated method names: 'YbI6ZsuPbo', 'Vux6OOkQDF', 'umd67juoqy', 'R846R7O1eJ', 'JwB6PYTXGA', 't7W6d7gRPy', 'cpA1YRwcEw5ryfLdb5', 'MQR4pBjcWwi94JP7hQ', 'hJ866kxMih', 'EFR6SHea3r'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, I38pUe6t7WXsXlogmy.csHigh entropy of concatenated method names: 'LbZh7IvgLd', 'Uj7hRc5YrJ', 'ToString', 'vOnhgjoZKS', 'DdOh86pOex', 'sXqhb3Sjkx', 'mYEhL2aSRJ', 'Gxbhj3sf0V', 'VjEhZ8tHnL', 'kTGhOHW0Yu'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, iEKcOvmtINUjNdIxUp.csHigh entropy of concatenated method names: 'YEjpcJDuij', 'YNgpJCxqcB', 'EktpD3e2DT', 'VifpTYwu1f', 'JPkp4y31ij', 'SvKpIAFPTX', 'tYlpNJ8QRn', 'rp2pk0pxIB', 'FtZpt6ANAC', 'BCqpvQBZhu'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, icnyvGRWc4iSEs6Z1i.csHigh entropy of concatenated method names: 'H8RKD6xNOr', 'OT5KTw7KK0', 'coQKF3s24a', 'b1XK4HUuWK', 'GFeK1aObn7', 'prrKIMQxUi', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, Tm4eY7SpNLngkW1jjR.csHigh entropy of concatenated method names: 'K76hUq5lsm', 'Tpvhwq4hNY', 'tknK9WDtkK', 'LyQK6pFkh6', 'uNShv3NsyM', 'oGchEMcjIL', 'guvhmyuNLw', 'ouJh12CEbH', 'XMkhGaVIjT', 'KlghsMGgyS'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, rs20SYxZyvheyqXEQd.csHigh entropy of concatenated method names: 'Dispose', 'rUZ6eNDpcb', 'biTqTFb5Fk', 'gDrQQkjKZJ', 'THH6wWJmbD', 'kda6zJCHYu', 'ProcessDialogKey', 'A2Mq94oKU0', 'OB9q698t0I', 'NYoqqVrhZ0'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, hJTloJFbXxZIRB6W0m.csHigh entropy of concatenated method names: 'LQTZ2bsDVd', 'X0lZoSwdVc', 'iVKZVXoL8E', 'smTZBSyliy', 'CHGZ3ndUNc', 'iGfZfIouXI', 'EIeZuo1Kcy', 'pfnZcBjYUG', 'auBZJY2eQh', 'ClHZCpVR2U'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, EeoSfFkThqBKXqmctb.csHigh entropy of concatenated method names: 'CjZY6aR67N', 'IgVYSAlgjK', 'T4dYHuLICW', 'THFYgUASdK', 'KTlY831LGu', 'vYaYLHyf9L', 'zJrYjGYiqt', 'clOKlJVKTQ', 'lL6KU9l9nr', 'MRGKeDtmex'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, fRpDGRElkLdWeLTLhB.csHigh entropy of concatenated method names: 'OEibBFFsfZ', 'pM8bflLXeD', 'S49bceYT2k', 'yAZbJlkJFc', 'eCubPap10G', 'lCBbdNIY37', 'plEbhOhRJM', 'rx3bKwmLHd', 'xBhbYbe1Lp', 'nrbb0OF9GN'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, KVi3Lnl1FN3s7CDXNX.csHigh entropy of concatenated method names: 'BDKPtQBw3k', 'cNZPEQIcV4', 'SppP1KCbyC', 'j5aPGWYTBQ', 'oeaPTTBSQj', 'fqoPFANRkq', 'LM1P4RuXEJ', 'jgHPIGpuB8', 'ulbPXcSh5S', 'iOfPNFiQlO'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, jGHOv18a5w8PjVVYwm.csHigh entropy of concatenated method names: 'UQCKgrM0Zl', 'DAiK8T1cks', 'gUqKb96Eq5', 'Sf4KLjONdO', 'fntKj4hkgb', 'CftKZUlZe1', 'SJ6KOGDrrW', 'eEiKibM7RL', 'HgxK7caJb3', 'MdAKRrcRmQ'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, oVGOujQOvPgAHZGkcq.csHigh entropy of concatenated method names: 'bnBZgxknjS', 'SfyZbtsfZK', 'qu6Zj0QNFr', 'n5qjwEFWNq', 'vLNjz5ULSB', 'IRiZ9GApnA', 'C3BZ6QqLh2', 'c2uZq23ip1', 'rkyZSIBgOP', 'cAcZHiOMHp'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, qbcoiMzUhP8f9tNdFP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qZPYpWxvl1', 'MTEYPio8Og', 'j8oYdgQ816', 'hj2Yh2mJOR', 'impYKEqRsq', 'QMJYYVH9AD', 'hY6Y0v9pFd'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, sT4fa64yY9KsZvBqo9.csHigh entropy of concatenated method names: 'wpXjM6xJSn', 'xX3j8modva', 'hQujLE0fnX', 'J9tjZRFVk7', 'LVujOVdgv5', 'K39L5ndqZD', 'GOoLAEkrHU', 'SXkLlk8QuJ', 'CNcLUh6EJq', 'KveLesSbH8'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, K15rpZAlZ8KJOtCk7n.csHigh entropy of concatenated method names: 'whN81YCwnn', 'mdA8GuofoU', 'gVQ8sB1huQ', 'bhe8r0jlaW', 'mfc85VTfVx', 'uIH8AWMYgE', 'utq8l1DAiM', 'rRx8UWxcrJ', 'gHq8eeINeO', 'vEv8wDm8Lb'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, YNnt5XuhXbQyUPQKYC8.csHigh entropy of concatenated method names: 'YDH02cE07u', 'I1s0oUrIT4', 'qX40VLxgq7', 'Olq9HDpgjHA5m1AHWjB', 'K9dG5SphOhA4J4LFR49', 'PD3x0vpQjfnYyLcwNMa', 'W6Tmijp8eUVdVMb6P7E'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, PPAA2g5X0KFLw0EIKA.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DM5qe0nLh9', 'Opiqw6Ba70', 'pPTqz5rqhl', 'rbLS9GJQdw', 'toAS6hhNFN', 'tsXSqYRWfm', 'twbSSFeTDw', 'w6fp5OHphsa8JNjSAk0'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, DHpRnuiuxA6oksal3k.csHigh entropy of concatenated method names: 'H58SMSgUdK', 'Ku1Sg53XVe', 'GakS8Vfme6', 'RVTSb8JXbj', 'ahHSL60ZC7', 't2oSjKiOcg', 'Lw3SZoQXvO', 'i2tSO22qvf', 'c9ESimGa5t', 'oYaS7KgrEu'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, pWmjVUuMrheMkybJUwo.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'a9001ungBD', 'ANq0GXQXB6', 'iF80sjk3tw', 'jym0rXXAN0', 'oQJ05REyjA', 'DyY0AkRcUm', 'Wjb0lpCrri'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, hQvpmRh1PYSBjv6EDa.csHigh entropy of concatenated method names: 'N8eVpvxaU', 'fpUB2ySOT', 't7If4t2MP', 'taVug4Uhb', 'SfMJApYdh', 'GZvC5Lwyu', 'iBuCqFPcck0tgSij0V', 'bsFXoMMHB5hSAYmH0B', 'f2AKfiLeM', 'aIJ01EpqG'
                        Source: 0.2.fatura.bat.exe.4735700.5.raw.unpack, UUnZKquvEkfoZN3nqfZ.csHigh entropy of concatenated method names: 'qJlY2vB8b0', 'AuPYo6MBJ8', 'vBnYVFgPE7', 'iBxYBoBvY6', 'YMcY3EVe26', 'oNkYfsA5g6', 'AAWYuyh0fX', 'EGXYciuQ4m', 'fWlYJhGsu8', 'VIJYCm8M2f'
                        Source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                        Source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                        Source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00406EB0 ShellExecuteW,URLDownloadToFileW,12_2_00406EB0
                        Source: C:\Users\user\Desktop\fatura.bat.exeFile created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_0041AA4A

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7404, type: MEMORYSTR
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040F7A7 Sleep,ExitProcess,12_2_0040F7A7
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 13B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 3260000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 8220000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 9220000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: 93D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: A3D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: C60000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: E90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: 7480000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: 8480000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: 8620000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory allocated: 9620000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_0041A748
                        Source: C:\Users\user\Desktop\fatura.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7284Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1627Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeWindow / User API: threadDelayed 3968Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeWindow / User API: threadDelayed 5791Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeAPI coverage: 6.4 %
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 5352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7280Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7324Thread sleep count: 89 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7324Thread sleep time: -44500s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7328Thread sleep count: 3968 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7328Thread sleep time: -11904000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7328Thread sleep count: 5791 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exe TID: 7328Thread sleep time: -17373000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409253
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,12_2_0041C291
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,12_2_0040C34D
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,12_2_00409665
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,12_2_0040880C
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040783C FindFirstFileW,FindNextFileW,12_2_0040783C
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00419AF5
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040BB30
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040BD37
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00407C97
                        Source: C:\Users\user\Desktop\fatura.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>
                        Source: fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(R
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_004349F9
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041CB50
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004432B5 mov eax, dword ptr fs:[00000030h]12_2_004432B5
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00412077 GetProcessHeap,HeapFree,12_2_00412077
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_004349F9
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00434B47 SetUnhandledExceptionFilter,12_2_00434B47
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043BB22
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00434FDC
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeMemory written: C:\Users\user\Desktop\fatura.bat.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMemory written: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_004120F7
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00419627 mouse_event,12_2_00419627
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeProcess created: C:\Users\user\Desktop\fatura.bat.exe "C:\Users\user\Desktop\fatura.bat.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeProcess created: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"Jump to behavior
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\J
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\)
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069720580.0000000000F27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\"
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\D
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\?
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerX
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\8
                        Source: fatura.bat.exe, 00000007.00000002.4069720580.0000000000F27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerGhi
                        Source: fatura.bat.exe, 00000007.00000002.4069653607.0000000000F18000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069720580.0000000000F27000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: fatura.bat.exe, 00000007.00000002.4069720580.0000000000F27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerLhb
                        Source: fatura.bat.exe, 00000007.00000002.4069804268.0000000000F4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager97\0
                        Source: fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, nots.dat.7.drBinary or memory string: [Program Manager]
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_00434C52 cpuid 12_2_00434C52
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: EnumSystemLocalesW,12_2_00452036
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_004520C3
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoW,12_2_00452313
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: EnumSystemLocalesW,12_2_00448404
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_0045243C
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoW,12_2_00452543
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_00452610
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoA,12_2_0040F8D1
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: GetLocaleInfoW,12_2_004488ED
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00451CD8
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: EnumSystemLocalesW,12_2_00451F50
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: EnumSystemLocalesW,12_2_00451F9B
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Users\user\Desktop\fatura.bat.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\fatura.bat.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeQueries volume information: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0040B164 GetLocalTime,wsprintfW,12_2_0040B164
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_0041B60D GetUserNameW,12_2_0041B60D
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: 12_2_004493AD _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,12_2_004493AD
                        Source: C:\Users\user\Desktop\fatura.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.5c10000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32c9b80.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32b8f08.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.3285814.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b4585c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1669557632.0000000005C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1747777682.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665164596.0000000003261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 7300, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\note\nots.dat, type: DROPPED
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040BA12
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040BB30
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: \key3.db12_2_0040BB30

                        Remote Access Functionality

                        barindex
                        Source: C:\Users\user\Desktop\fatura.bat.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-999Z97Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-999Z97Jump to behavior
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.5c10000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.5c10000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32c9b80.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32c9b80.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32b8f08.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b89bc8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.32b8f08.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.3285814.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b78f50.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.KGuxmqSTXgJca.exe.2b4585c.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1669557632.0000000005C10000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.1747777682.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665164596.0000000003261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.KGuxmqSTXgJca.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.467b0e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.fatura.bat.exe.4505510.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 6816, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: fatura.bat.exe PID: 7300, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: KGuxmqSTXgJca.exe PID: 7632, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\note\nots.dat, type: DROPPED
                        Source: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exeCode function: cmd.exe12_2_0040569A
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services12
                        Archive Collected Data
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Bypass User Account Control
                        11
                        Deobfuscate/Decode Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol211
                        Input Capture
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        1
                        Access Token Manipulation
                        3
                        Obfuscated Files or Information
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares3
                        Clipboard Data
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts2
                        Service Execution
                        Login Hook1
                        Windows Service
                        22
                        Software Packing
                        NTDS3
                        File and Directory Discovery
                        Distributed Component Object ModelInput Capture1
                        Remote Access Software
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                        Process Injection
                        1
                        DLL Side-Loading
                        LSA Secrets33
                        System Information Discovery
                        SSHKeylogging2
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                        Scheduled Task/Job
                        1
                        Bypass User Account Control
                        Cached Domain Credentials121
                        Security Software Discovery
                        VNCGUI Input Capture22
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Masquerading
                        DCSync31
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                        Virtualization/Sandbox Evasion
                        Proc Filesystem3
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                        Access Token Manipulation
                        /etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron122
                        Process Injection
                        Network Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435905 Sample: fatura.bat.exe Startdate: 03/05/2024 Architecture: WINDOWS Score: 100 43 sembe.duckdns.org 2->43 45 geoplugin.net 2->45 51 Multi AV Scanner detection for domain / URL 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 59 13 other signatures 2->59 8 KGuxmqSTXgJca.exe 5 2->8         started        11 fatura.bat.exe 7 2->11         started        signatures3 57 Uses dynamic DNS services 43->57 process4 file5 61 Multi AV Scanner detection for dropped file 8->61 63 Contains functionality to bypass UAC (CMSTPLUA) 8->63 65 Contains functionalty to change the wallpaper 8->65 73 5 other signatures 8->73 14 KGuxmqSTXgJca.exe 8->14         started        17 schtasks.exe 1 8->17         started        39 C:\Users\user\AppData\...\KGuxmqSTXgJca.exe, PE32 11->39 dropped 41 C:\Users\user\AppData\Local\...\tmpAAA4.tmp, XML 11->41 dropped 67 Uses schtasks.exe or at.exe to add and modify task schedules 11->67 69 Adds a directory exclusion to Windows Defender 11->69 71 Injects a PE file into a foreign processes 11->71 19 fatura.bat.exe 3 15 11->19         started        23 powershell.exe 23 11->23         started        25 schtasks.exe 1 11->25         started        27 fatura.bat.exe 11->27         started        signatures6 process7 dnsIp8 29 conhost.exe 17->29         started        47 sembe.duckdns.org 194.187.251.115, 14645, 49735 M247GB United Kingdom 19->47 49 geoplugin.net 178.237.33.50, 49738, 80 ATOM86-ASATOM86NL Netherlands 19->49 37 C:\Users\user\AppData\Local\Temp\...\nots.dat, data 19->37 dropped 75 Detected Remcos RAT 19->75 77 Installs a global keyboard hook 19->77 79 Loading BitLocker PowerShell Module 23->79 31 WmiPrvSE.exe 23->31         started        33 conhost.exe 23->33         started        35 conhost.exe 25->35         started        file9 signatures10 process11

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        fatura.bat.exe39%VirustotalBrowse
                        fatura.bat.exe39%ReversingLabsByteCode-MSIL.Trojan.SnakeKeyLogger
                        fatura.bat.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe39%ReversingLabsByteCode-MSIL.Trojan.SnakeKeyLogger
                        C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe38%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        sembe.duckdns.org12%VirustotalBrowse
                        geoplugin.net4%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://geoplugin.net/json.gp100%URL Reputationphishing
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        http://geoplugin.net/json.gp/C100%URL Reputationphishing
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                        http://geoplugin.net/json.gpSystem320%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                        sembe.duckdns.org100%Avira URL Cloudmalware
                        http://ocsp.comodoca.co0%Avira URL Cloudsafe
                        http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                        https://secure.comodo0%Avira URL Cloudsafe
                        sembe.duckdns.org12%VirustotalBrowse
                        http://ocsp.comodoca.co0%VirustotalBrowse
                        http://www.founder.com.cn/cn0%VirustotalBrowse
                        http://www.zhongyicts.com.cn1%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        sembe.duckdns.org
                        194.187.251.115
                        truetrueunknown
                        geoplugin.net
                        178.237.33.50
                        truefalseunknown
                        NameMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gptrue
                        • URL Reputation: phishing
                        unknown
                        sembe.duckdns.orgtrue
                        • 12%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bThefatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers?fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.tiro.comfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.goodfont.co.krfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.chiark.greenend.org.uk/~sgtatham/putty/0fatura.bat.exe, KGuxmqSTXgJca.exe.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://geoplugin.net/json.gpSystem32fatura.bat.exe, 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cThefatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-user.htmlfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://geoplugin.net/json.gp/Cfatura.bat.exe, 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, KGuxmqSTXgJca.exe, 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                        • URL Reputation: phishing
                                        unknown
                                        http://www.jiyu-kobo.co.jp/fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleasefatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fonts.comfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleasefatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://ocsp.comodoca.cofatura.bat.exe, 00000000.00000002.1671869767.0000000007868000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.zhongyicts.com.cnfatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • 1%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefatura.bat.exe, 00000000.00000002.1665164596.00000000032F9000.00000004.00000800.00020000.00000000.sdmp, KGuxmqSTXgJca.exe, 00000008.00000002.1747777682.0000000002B21000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.sakkal.comfatura.bat.exe, 00000000.00000002.1670045326.00000000062B0000.00000004.00000020.00020000.00000000.sdmp, fatura.bat.exe, 00000000.00000002.1670203234.0000000007382000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://secure.comodofatura.bat.exe, 00000000.00000002.1671869767.0000000007868000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              178.237.33.50
                                              geoplugin.netNetherlands
                                              8455ATOM86-ASATOM86NLfalse
                                              194.187.251.115
                                              sembe.duckdns.orgUnited Kingdom
                                              9009M247GBtrue
                                              Joe Sandbox version:40.0.0 Tourmaline
                                              Analysis ID:1435905
                                              Start date and time:2024-05-03 11:51:06 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 9m 10s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:17
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:fatura.bat.exe
                                              Detection:MAL
                                              Classification:mal100.rans.troj.spyw.expl.evad.winEXE@18/13@2/2
                                              EGA Information:
                                              • Successful, ratio: 75%
                                              HCA Information:
                                              • Successful, ratio: 96%
                                              • Number of executed functions: 119
                                              • Number of non-executed functions: 218
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target fatura.bat.exe, PID 7300 because there are no executed function
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtCreateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              10:51:56Task SchedulerRun new task: KGuxmqSTXgJca path: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                              11:51:51API Interceptor4761216x Sleep call for process: fatura.bat.exe modified
                                              11:51:55API Interceptor17x Sleep call for process: powershell.exe modified
                                              11:51:59API Interceptor1x Sleep call for process: KGuxmqSTXgJca.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              178.237.33.50proof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                              • geoplugin.net/json.gp
                                              586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              • geoplugin.net/json.gp
                                              xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                              • geoplugin.net/json.gp
                                              PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              • geoplugin.net/json.gp
                                              REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                              • geoplugin.net/json.gp
                                              INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                              • geoplugin.net/json.gp
                                              Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                              • geoplugin.net/json.gp
                                              GVV.exeGet hashmaliciousRemcosBrowse
                                              • geoplugin.net/json.gp
                                              INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                              • geoplugin.net/json.gp
                                              Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              • geoplugin.net/json.gp
                                              194.187.251.115nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                1714456209369804801bdf0184bf91899d6952ac3158287761ba79e58bda9aa9358475c597235.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  Ziraat Bankas#U0131 Swift Mesaji2.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                    SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                                      5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                        DETAILS.docx.docGet hashmaliciousRemcosBrowse
                                                          TSTS 0005A.bat.exeGet hashmaliciousRemcosBrowse
                                                            UNB-PIO88938MBANSOP.docx.docGet hashmaliciousRemcosBrowse
                                                              SecuriteInfo.com.Exploit.ShellCode.69.22577.16704.rtfGet hashmaliciousRemcosBrowse
                                                                240202PIMXF24C.docx.docGet hashmaliciousRemcosBrowse
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  sembe.duckdns.orgnU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  1714456209369804801bdf0184bf91899d6952ac3158287761ba79e58bda9aa9358475c597235.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  Ziraat Bankas#U0131 Swift Mesaji2.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                  • 194.187.251.115
                                                                  SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  DETAILS.docx.docGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  TSTS 0005A.bat.exeGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  UNB-PIO88938MBANSOP.docx.docGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  SecuriteInfo.com.Exploit.ShellCode.69.22577.16704.rtfGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  240202PIMXF24C.docx.docGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  geoplugin.netproof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                  • 178.237.33.50
                                                                  586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  GVV.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  ATOM86-ASATOM86NLproof of paymentt.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                  • 178.237.33.50
                                                                  586 R1 M-LINE - GEORGIA 03.05.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  xi0TpAxHGMsm.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  PO-USC-22USC-KonchoCo.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Teklif talebi BAKVENTA-BAKUUsurpationens.cmdGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  GVV.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  Evgh. rvs Armenia. 30.04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  M247GBc8sDO7umrx.exeGet hashmaliciousCMSBruteBrowse
                                                                  • 31.14.252.98
                                                                  p67UidesWn.elfGet hashmaliciousMiraiBrowse
                                                                  • 38.202.251.236
                                                                  nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  KFOxk19cHL.elfGet hashmaliciousMiraiBrowse
                                                                  • 196.16.120.148
                                                                  Invoice-939713625-008-5283127-8901604.jsGet hashmaliciousUnknownBrowse
                                                                  • 91.202.233.252
                                                                  ith you..emlGet hashmaliciousHTMLPhisherBrowse
                                                                  • 172.86.67.18
                                                                  1714456209369804801bdf0184bf91899d6952ac3158287761ba79e58bda9aa9358475c597235.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 194.187.251.115
                                                                  2cO52KdAG9.elfGet hashmaliciousMiraiBrowse
                                                                  • 158.46.140.120
                                                                  MG6OHOu9nZ.elfGet hashmaliciousUnknownBrowse
                                                                  • 45.82.165.4
                                                                  Ziraat Bankas#U0131 Swift Mesaji2.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                  • 194.187.251.115
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.34331486778365
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):1216
                                                                  Entropy (8bit):5.34331486778365
                                                                  Encrypted:false
                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                  Malicious:false
                                                                  Reputation:high, very likely benign file
                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):965
                                                                  Entropy (8bit):5.023626250399301
                                                                  Encrypted:false
                                                                  SSDEEP:12:tkeknd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7x:qPdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                  MD5:1D705D315B7FECE2D6C13A47EFD128A7
                                                                  SHA1:32114D761B27C27C3686DC835AAD5E05B6B5A6F3
                                                                  SHA-256:52729AABEA95E5F9A1C211F9C952B6827328D2AA816B8138048F1691DD638023
                                                                  SHA-512:28CDA3717CD460797BD65CD6FD9CF79C683DB45DA67D0C1C27C3CDEAFFCEA6541CA36F63BD10C66BC36DA74B1399B9B4AA0A4F0F205C4E1A630BD6886E501148
                                                                  Malicious:false
                                                                  Preview:{. "geoplugin_request":"191.96.227.219",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):2232
                                                                  Entropy (8bit):5.379736180876081
                                                                  Encrypted:false
                                                                  SSDEEP:48:tWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//MPUyus:tLHyIFKL3IZ2KRH9Ougss
                                                                  MD5:84D0B3B07B2FABFD5D0F3E724F41E2CE
                                                                  SHA1:8CB94823F1D28AA12678C877E2E1CF0D57CE5C69
                                                                  SHA-256:9F2745B3228D5DCFA4E9B4659F5A2A58A3446B7AECD20294BA34BF3A0312E0E3
                                                                  SHA-512:DAE272A0BB99FAB9A217FD4B448DE9847795636777DE9BA769A087DA5505BBCD5B5C29EE48C1241735A4F4AC9EF61E393B859C138D1F6244DF317A664D93375F
                                                                  Malicious:false
                                                                  Preview:@...e.................................,..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):144
                                                                  Entropy (8bit):3.3603882199736725
                                                                  Encrypted:false
                                                                  SSDEEP:3:rhlKlFflUlzQFb5JWRal2Jl+7R0DAlBG45klovDl6v:6llO2Fb5YcIeeDAlOWAv
                                                                  MD5:B3DCB309BE30D3237D7C29211C1B1F9E
                                                                  SHA1:6ADE0B961B9814565E6E657B14139D36526AC892
                                                                  SHA-256:D415D77FAA2D60DFD398E4984A3FA88E663CDB2AFFF436F404112FF2B89BF4D8
                                                                  SHA-512:7EDF05CABBECC3FEDDC375C8F3F1CF8F64CD0D5E3CC666DDBFB99D39D889C7224E9E1B50C21824E05170CE14E85273EEA58C7D0569536FC6E739712BFA5DF9CF
                                                                  Malicious:true
                                                                  Yara Hits:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Local\Temp\note\nots.dat, Author: Joe Security
                                                                  Preview:....[.2.0.2.4./.0.5./.0.3. .1.1.:.5.1.:.5.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:XML 1.0 document, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1579
                                                                  Entropy (8bit):5.1227457984389435
                                                                  Encrypted:false
                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNta0Jxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTr/v
                                                                  MD5:AA14E665B2134AA815AA7AE4794FFE5A
                                                                  SHA1:FC8C557E9D7F2703C5CC672738F478A080B0A6C7
                                                                  SHA-256:BF771C25611ACAF8734FCED607A742CE1BF01AC20036A8FFFD71F5D3FEF8E35F
                                                                  SHA-512:F4BA11097DD6F6B9BE221BF523A866760A945C0128B23523B37A33E9EE8D791892281E2A9CB264AC5FD267DA5BD11F7BF5175C49DD8F86E23994729E639A3A23
                                                                  Malicious:true
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                  Process:C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                  File Type:XML 1.0 document, ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):1579
                                                                  Entropy (8bit):5.1227457984389435
                                                                  Encrypted:false
                                                                  SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNta0Jxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTr/v
                                                                  MD5:AA14E665B2134AA815AA7AE4794FFE5A
                                                                  SHA1:FC8C557E9D7F2703C5CC672738F478A080B0A6C7
                                                                  SHA-256:BF771C25611ACAF8734FCED607A742CE1BF01AC20036A8FFFD71F5D3FEF8E35F
                                                                  SHA-512:F4BA11097DD6F6B9BE221BF523A866760A945C0128B23523B37A33E9EE8D791892281E2A9CB264AC5FD267DA5BD11F7BF5175C49DD8F86E23994729E639A3A23
                                                                  Malicious:false
                                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):1000968
                                                                  Entropy (8bit):7.941338951684853
                                                                  Encrypted:false
                                                                  SSDEEP:12288:LUeoUNewB3gRMyx0Tg+FLFnpEa09nVKqejbpmbCHYCUdZpryv0avV+yJNdOIwWio:F1djyW3mamVKqPC6Lro+y7DwreyGuAT
                                                                  MD5:60343E738C518F3BA896EAE58CA1D71C
                                                                  SHA1:1F8DB86A369116A6E9D95C62255EF37AA7070E11
                                                                  SHA-256:6703DF15130444806D68473D071445CFE26EFB0570F06DF656711A74D18264F6
                                                                  SHA-512:9D70D9D15E1B1EDE2A82E1180CF1CA31DE16E9EF5426E6991E5378C78782AA54CF8525C4AC5A9D051F9B734649282F550E645B6BD4774CCF87938993F428235B
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 39%
                                                                  • Antivirus: Virustotal, Detection: 38%, Browse
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4f..............0......h......R.... ........@.. .......................@............@.....................................O........Y...............6... ....................................................... ............... ..H............text...x.... ...................... ..`.rsrc....Y.......`..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\fatura.bat.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:false
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):7.941338951684853
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.96%
                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                  File name:fatura.bat.exe
                                                                  File size:1'000'968 bytes
                                                                  MD5:60343e738c518f3ba896eae58ca1d71c
                                                                  SHA1:1f8db86a369116a6e9d95c62255ef37aa7070e11
                                                                  SHA256:6703df15130444806d68473d071445cfe26efb0570f06df656711a74d18264f6
                                                                  SHA512:9d70d9d15e1b1ede2a82e1180cf1ca31de16e9ef5426e6991e5378c78782aa54cf8525c4ac5a9d051f9b734649282f550e645b6bd4774ccf87938993f428235b
                                                                  SSDEEP:12288:LUeoUNewB3gRMyx0Tg+FLFnpEa09nVKqejbpmbCHYCUdZpryv0avV+yJNdOIwWio:F1djyW3mamVKqPC6Lro+y7DwreyGuAT
                                                                  TLSH:132512469E2CA605E534B2F9C16443D10FB57C01E824D1EA2BB3B9CAE633713CE56A5F
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....4f..............0......h......R.... ........@.. .......................@............@................................
                                                                  Icon Hash:3f2730cb88888a75
                                                                  Entrypoint:0x4eba52
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x663482B6 [Fri May 3 06:22:46 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Signature Valid:false
                                                                  Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                  Error Number:-2146869232
                                                                  Not Before, Not After
                                                                  • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                                                  Subject Chain
                                                                  • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                  Version:3
                                                                  Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                  Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                  Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                  Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  cmp dword ptr [ecx], esi
                                                                  xor al, 4Fh
                                                                  cmp byte ptr [esi], dh
                                                                  xor eax, 00004251h
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [ebx+39h], cl
                                                                  cmp byte ptr [edx+eax*2], dh
                                                                  push ebp
                                                                  inc esp
                                                                  cmp dword ptr [eax+5Ah], ecx
                                                                  aaa
                                                                  cmp byte ptr [eax+eax+00h], dl
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  add byte ptr [eax], al
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xeba000x4f.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x59cc.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xf10000x3608
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000xe9a780xea0008fbdb48a45420ad50620ec5822942ad3False0.9701532869257479data7.974179168934569IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0xec0000x59cc0x6000385ef538cb8522fd1197f9c250b70d82False0.1041259765625data3.9172618849419476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xf20000xc0x8000517852e04414b1ba852d779a952fccfFalse0.015625data0.03037337037012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xec1180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 30236 x 30236 px/m0.09075785582255083
                                                                  RT_GROUP_ICON0xf15a00x14data1.05
                                                                  RT_GROUP_ICON0xf15b40x14data1.05
                                                                  RT_VERSION0xf15c80x404data0.4280155642023346
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 3, 2024 11:51:56.947496891 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:57.249123096 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:57.249198914 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:57.254931927 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:57.557815075 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:57.606852055 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:57.907250881 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:57.911727905 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:58.271661997 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:58.271717072 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:58.629309893 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:58.647948027 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:58.841217041 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:59.141666889 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:51:59.263094902 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:51:59.857660055 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:52:00.096637964 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:52:00.211694956 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:52:00.265789986 CEST8049738178.237.33.50192.168.2.4
                                                                  May 3, 2024 11:52:00.265857935 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:52:00.272689104 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:52:00.451652050 CEST8049738178.237.33.50192.168.2.4
                                                                  May 3, 2024 11:52:00.451735020 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:52:00.540035009 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:52:00.902339935 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:52:01.453361988 CEST8049738178.237.33.50192.168.2.4
                                                                  May 3, 2024 11:52:01.453449965 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:52:30.178050041 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:52:30.179367065 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:52:30.531045914 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:53:00.261890888 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:53:00.310058117 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:53:00.345627069 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:53:00.709779978 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:53:30.324882984 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:53:30.327022076 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:53:30.676357985 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:53:49.951045036 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:53:50.466502905 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:53:51.482055902 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:53:53.294538975 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:53:56.778896093 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:54:00.393580914 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:54:00.394941092 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:54:00.788628101 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:54:03.778909922 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:54:17.673063993 CEST4973880192.168.2.4178.237.33.50
                                                                  May 3, 2024 11:54:30.470109940 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:54:30.471688986 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:54:30.825618982 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:55:00.540190935 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:55:00.669630051 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:55:03.415225983 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:55:03.768229008 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:55:30.610989094 CEST1464549735194.187.251.115192.168.2.4
                                                                  May 3, 2024 11:55:30.615752935 CEST4973514645192.168.2.4194.187.251.115
                                                                  May 3, 2024 11:55:30.966691971 CEST1464549735194.187.251.115192.168.2.4
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 3, 2024 11:51:56.807662010 CEST6069853192.168.2.41.1.1.1
                                                                  May 3, 2024 11:51:56.909856081 CEST53606981.1.1.1192.168.2.4
                                                                  May 3, 2024 11:51:59.994127989 CEST5262353192.168.2.41.1.1.1
                                                                  May 3, 2024 11:52:00.083642960 CEST53526231.1.1.1192.168.2.4
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  May 3, 2024 11:51:56.807662010 CEST192.168.2.41.1.1.10x64daStandard query (0)sembe.duckdns.orgA (IP address)IN (0x0001)false
                                                                  May 3, 2024 11:51:59.994127989 CEST192.168.2.41.1.1.10x354dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  May 3, 2024 11:51:56.909856081 CEST1.1.1.1192.168.2.40x64daNo error (0)sembe.duckdns.org194.187.251.115A (IP address)IN (0x0001)false
                                                                  May 3, 2024 11:52:00.083642960 CEST1.1.1.1192.168.2.40x354dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                  • geoplugin.net
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.449738178.237.33.50807300C:\Users\user\Desktop\fatura.bat.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  May 3, 2024 11:52:00.272689104 CEST71OUTGET /json.gp HTTP/1.1
                                                                  Host: geoplugin.net
                                                                  Cache-Control: no-cache
                                                                  May 3, 2024 11:52:00.451652050 CEST1173INHTTP/1.1 200 OK
                                                                  date: Fri, 03 May 2024 09:52:00 GMT
                                                                  server: Apache
                                                                  content-length: 965
                                                                  content-type: application/json; charset=utf-8
                                                                  cache-control: public, max-age=300
                                                                  access-control-allow-origin: *
                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 39 31 2e 39 36 2e 32 32 37 2e 32 31 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                                  Data Ascii: { "geoplugin_request":"191.96.227.219", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:11:51:50
                                                                  Start date:03/05/2024
                                                                  Path:C:\Users\user\Desktop\fatura.bat.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\fatura.bat.exe"
                                                                  Imagebase:0xd80000
                                                                  File size:1'000'968 bytes
                                                                  MD5 hash:60343E738C518F3BA896EAE58CA1D71C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1669557632.0000000005C10000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1665164596.0000000003261000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1665741993.000000000443E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
                                                                  Imagebase:0x8e0000
                                                                  File size:433'152 bytes
                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:3
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"
                                                                  Imagebase:0x860000
                                                                  File size:187'904 bytes
                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Users\user\Desktop\fatura.bat.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Users\user\Desktop\fatura.bat.exe"
                                                                  Imagebase:0x30000
                                                                  File size:1'000'968 bytes
                                                                  MD5 hash:60343E738C518F3BA896EAE58CA1D71C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:11:51:55
                                                                  Start date:03/05/2024
                                                                  Path:C:\Users\user\Desktop\fatura.bat.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\fatura.bat.exe"
                                                                  Imagebase:0x830000
                                                                  File size:1'000'968 bytes
                                                                  MD5 hash:60343E738C518F3BA896EAE58CA1D71C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.4069495861.0000000000ED7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:8
                                                                  Start time:11:51:56
                                                                  Start date:03/05/2024
                                                                  Path:C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                  Imagebase:0x520000
                                                                  File size:1'000'968 bytes
                                                                  MD5 hash:60343E738C518F3BA896EAE58CA1D71C
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.1747777682.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 39%, ReversingLabs
                                                                  • Detection: 38%, Virustotal, Browse
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:11:51:57
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                  Imagebase:0x7ff693ab0000
                                                                  File size:496'640 bytes
                                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:11:52:01
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp"
                                                                  Imagebase:0x860000
                                                                  File size:187'904 bytes
                                                                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:11:52:01
                                                                  Start date:03/05/2024
                                                                  Path:C:\Windows\System32\conhost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  Imagebase:0x7ff7699e0000
                                                                  File size:862'208 bytes
                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:11:52:02
                                                                  Start date:03/05/2024
                                                                  Path:C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
                                                                  Imagebase:0x490000
                                                                  File size:1'000'968 bytes
                                                                  MD5 hash:60343E738C518F3BA896EAE58CA1D71C
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1744062852.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:10.7%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:201
                                                                    Total number of Limit Nodes:5
                                                                    execution_graph 25826 7d05d60 25827 7d05d7c 25826->25827 25831 7d08230 25827->25831 25835 7d08221 25827->25835 25828 7d05d8c 25832 7d0824a 25831->25832 25839 7d08550 25832->25839 25833 7d0826e 25833->25828 25836 7d08230 25835->25836 25838 7d08550 11 API calls 25836->25838 25837 7d0826e 25837->25828 25838->25837 25840 7d0855d 25839->25840 25841 7d08587 25840->25841 25859 7d0896d 25840->25859 25864 7d08aab 25840->25864 25868 7d086ca 25840->25868 25872 7d089a8 25840->25872 25877 7d08be5 25840->25877 25882 7d089e0 25840->25882 25891 7d08bff 25840->25891 25896 7d08d1e 25840->25896 25901 7d088bd 25840->25901 25906 7d08d9d 25840->25906 25911 7d0895a 25840->25911 25915 7d08a56 25840->25915 25919 7d08733 25840->25919 25923 7d08810 25840->25923 25927 7d08870 25840->25927 25937 7d088ef 25840->25937 25942 7d0878f 25840->25942 25841->25833 25860 7d088f6 25859->25860 25947 7d05551 25860->25947 25951 7d05558 25860->25951 25861 7d0885d 25861->25841 25865 7d08ab1 25864->25865 25955 7d05648 25865->25955 25959 7d057e0 25868->25959 25963 7d057d4 25868->25963 25873 7d089ae 25872->25873 25876 7d05308 ResumeThread 25873->25876 25967 7d05310 25873->25967 25874 7d08d50 25876->25874 25878 7d089bf 25877->25878 25880 7d05310 ResumeThread 25878->25880 25881 7d05308 ResumeThread 25878->25881 25879 7d08d50 25880->25879 25881->25879 25883 7d089f1 25882->25883 25885 7d0878e 25882->25885 25971 7d053b9 25883->25971 25975 7d053c0 25883->25975 25884 7d08fbc 25887 7d05310 ResumeThread 25885->25887 25888 7d05308 ResumeThread 25885->25888 25886 7d08d50 25887->25886 25888->25886 25892 7d08c05 25891->25892 25894 7d05551 WriteProcessMemory 25892->25894 25895 7d05558 WriteProcessMemory 25892->25895 25893 7d08dcc 25894->25893 25895->25893 25897 7d08d3b 25896->25897 25899 7d05310 ResumeThread 25897->25899 25900 7d05308 ResumeThread 25897->25900 25898 7d08d50 25899->25898 25900->25898 25902 7d08c24 25901->25902 25904 7d05551 WriteProcessMemory 25902->25904 25905 7d05558 WriteProcessMemory 25902->25905 25903 7d08dcc 25904->25903 25905->25903 25907 7d08e9e 25906->25907 25979 7d05491 25907->25979 25983 7d05498 25907->25983 25908 7d08ebc 25912 7d08729 25911->25912 25913 7d053c0 Wow64SetThreadContext 25912->25913 25914 7d053b9 Wow64SetThreadContext 25912->25914 25913->25912 25914->25912 25916 7d08ab2 25915->25916 25917 7d088b6 25916->25917 25918 7d05648 ReadProcessMemory 25916->25918 25917->25841 25918->25917 25920 7d08729 25919->25920 25921 7d053c0 Wow64SetThreadContext 25920->25921 25922 7d053b9 Wow64SetThreadContext 25920->25922 25921->25920 25922->25920 25925 7d05551 WriteProcessMemory 25923->25925 25926 7d05558 WriteProcessMemory 25923->25926 25924 7d0877b 25925->25924 25926->25924 25928 7d08875 25927->25928 25929 7d089f1 25928->25929 25930 7d0878e 25928->25930 25935 7d053c0 Wow64SetThreadContext 25929->25935 25936 7d053b9 Wow64SetThreadContext 25929->25936 25933 7d05310 ResumeThread 25930->25933 25934 7d05308 ResumeThread 25930->25934 25931 7d08fbc 25932 7d08d50 25933->25932 25934->25932 25935->25931 25936->25931 25938 7d088f5 25937->25938 25940 7d05551 WriteProcessMemory 25938->25940 25941 7d05558 WriteProcessMemory 25938->25941 25939 7d0885d 25939->25841 25940->25939 25941->25939 25943 7d087a9 25942->25943 25945 7d05310 ResumeThread 25943->25945 25946 7d05308 ResumeThread 25943->25946 25944 7d08d50 25945->25944 25946->25944 25948 7d05558 WriteProcessMemory 25947->25948 25950 7d055f7 25948->25950 25950->25861 25952 7d055a0 WriteProcessMemory 25951->25952 25954 7d055f7 25952->25954 25954->25861 25956 7d05693 ReadProcessMemory 25955->25956 25958 7d056d7 25956->25958 25958->25841 25960 7d05869 CreateProcessA 25959->25960 25962 7d05a2b 25960->25962 25964 7d05869 CreateProcessA 25963->25964 25966 7d05a2b 25964->25966 25968 7d05350 ResumeThread 25967->25968 25970 7d05381 25968->25970 25970->25874 25972 7d053c0 Wow64SetThreadContext 25971->25972 25974 7d0544d 25972->25974 25974->25884 25976 7d05405 Wow64SetThreadContext 25975->25976 25978 7d0544d 25976->25978 25978->25884 25980 7d05498 VirtualAllocEx 25979->25980 25982 7d05515 25980->25982 25982->25908 25984 7d054d8 VirtualAllocEx 25983->25984 25986 7d05515 25984->25986 25986->25908 25726 7d02511 25727 7d02524 25726->25727 25731 7d04f10 25727->25731 25735 7d04f20 25727->25735 25728 7d02557 25732 7d04f53 25731->25732 25733 7d04fc1 25732->25733 25739 7d05308 25732->25739 25733->25728 25736 7d04f53 25735->25736 25737 7d04fc1 25736->25737 25738 7d05308 ResumeThread 25736->25738 25737->25728 25738->25737 25740 7d0530f ResumeThread 25739->25740 25741 7d052b5 25739->25741 25743 7d05381 25740->25743 25741->25733 25743->25733 25744 7d02993 25745 7d029a3 25744->25745 25747 7d04f10 ResumeThread 25745->25747 25748 7d04f20 ResumeThread 25745->25748 25746 7d029d6 25747->25746 25748->25746 25759 13bd468 25760 13bd4ae GetCurrentProcess 25759->25760 25762 13bd4f9 25760->25762 25763 13bd500 GetCurrentThread 25760->25763 25762->25763 25764 13bd53d GetCurrentProcess 25763->25764 25766 13bd536 25763->25766 25765 13bd573 25764->25765 25767 13bd59b GetCurrentThreadId 25765->25767 25766->25764 25768 13bd5cc 25767->25768 25769 13b4668 25770 13b467a 25769->25770 25771 13b4686 25770->25771 25773 13b4778 25770->25773 25774 13b479d 25773->25774 25778 13b4879 25774->25778 25782 13b4888 25774->25782 25775 13b47a7 25775->25771 25779 13b4888 25778->25779 25781 13b498c 25779->25781 25786 13b44b4 25779->25786 25781->25775 25783 13b48af 25782->25783 25784 13b44b4 CreateActCtxA 25783->25784 25785 13b498c 25783->25785 25784->25785 25785->25775 25787 13b5918 CreateActCtxA 25786->25787 25789 13b59db 25787->25789 25789->25789 25749 7d09498 25750 7d09658 25749->25750 25752 7d094be 25749->25752 25751 7d09623 25752->25751 25754 7d07994 25752->25754 25755 7d09718 PostMessageW 25754->25755 25756 7d09784 25755->25756 25756->25752 25757 13bd6b0 DuplicateHandle 25758 13bd746 25757->25758 25790 13bacd0 25791 13bacd1 25790->25791 25795 13badc8 25791->25795 25803 13badb7 25791->25803 25792 13bacdf 25797 13badc9 25795->25797 25796 13badfc 25796->25792 25797->25796 25811 13bb051 25797->25811 25818 13bb060 25797->25818 25798 13badf4 25798->25796 25799 13bb000 GetModuleHandleW 25798->25799 25800 13bb02d 25799->25800 25800->25792 25804 13badc8 25803->25804 25805 13badfc 25804->25805 25809 13bb051 2 API calls 25804->25809 25810 13bb060 LoadLibraryExW 25804->25810 25805->25792 25806 13badf4 25806->25805 25807 13bb000 GetModuleHandleW 25806->25807 25808 13bb02d 25807->25808 25808->25792 25809->25806 25810->25806 25812 13baff9 GetModuleHandleW 25811->25812 25815 13bb05a 25811->25815 25814 13bb02d 25812->25814 25814->25798 25817 13bb099 25815->25817 25822 13ba168 25815->25822 25817->25798 25819 13bb074 25818->25819 25820 13ba168 LoadLibraryExW 25819->25820 25821 13bb099 25819->25821 25820->25821 25821->25798 25823 13bb240 LoadLibraryExW 25822->25823 25825 13bb2b9 25823->25825 25825->25817

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 340 7a86a00-7a86a21 341 7a86a28-7a86b14 340->341 342 7a86a23 340->342 344 7a86b1a-7a86c71 341->344 345 7a87346-7a8736e 341->345 342->341 389 7a87314-7a87343 344->389 390 7a86c77-7a86cd2 344->390 348 7a879cd-7a879d6 345->348 349 7a8737c-7a87385 348->349 350 7a879dc-7a879f3 348->350 353 7a8738c-7a87480 349->353 354 7a87387 349->354 371 7a874aa 353->371 372 7a87482-7a8748e 353->372 354->353 376 7a874b0-7a874d0 371->376 374 7a87498-7a8749e 372->374 375 7a87490-7a87496 372->375 377 7a874a8 374->377 375->377 381 7a87530-7a875aa 376->381 382 7a874d2-7a8752b 376->382 377->376 400 7a875ac-7a875ff 381->400 401 7a87601-7a87644 381->401 394 7a879ca 382->394 389->345 397 7a86cd4 390->397 398 7a86cd7-7a86ce2 390->398 394->348 397->398 402 7a87226-7a8722c 398->402 430 7a8764f-7a87655 400->430 401->430 404 7a87232-7a872af 402->404 405 7a86ce7-7a86d05 402->405 444 7a872fe-7a87304 404->444 407 7a86d5c-7a86d71 405->407 408 7a86d07-7a86d0b 405->408 410 7a86d78-7a86d8e 407->410 411 7a86d73 407->411 408->407 413 7a86d0d-7a86d18 408->413 415 7a86d90 410->415 416 7a86d95-7a86dac 410->416 411->410 417 7a86d4e-7a86d54 413->417 415->416 421 7a86dae 416->421 422 7a86db3-7a86dc9 416->422 419 7a86d1a-7a86d1e 417->419 420 7a86d56-7a86d57 417->420 426 7a86d20 419->426 427 7a86d24-7a86d3c 419->427 424 7a86dda-7a86e4b 420->424 421->422 428 7a86dcb 422->428 429 7a86dd0-7a86dd7 422->429 434 7a86e4d 424->434 435 7a86e61-7a86fd9 424->435 426->427 431 7a86d3e 427->431 432 7a86d43-7a86d4b 427->432 428->429 429->424 433 7a876ac-7a876b8 430->433 431->432 432->417 438 7a876ba-7a87742 433->438 439 7a87657-7a87679 433->439 434->435 437 7a86e4f-7a86e5b 434->437 445 7a86fdb 435->445 446 7a86fef-7a8712a 435->446 437->435 466 7a87879-7a87882 438->466 441 7a8767b 439->441 442 7a87680-7a876a9 439->442 441->442 442->433 449 7a872b1-7a872fb 444->449 450 7a87306-7a8730c 444->450 445->446 451 7a86fdd-7a86fe9 445->451 459 7a8712c-7a87130 446->459 460 7a8718e-7a871a3 446->460 449->444 450->389 451->446 459->460 461 7a87132-7a87141 459->461 463 7a871aa-7a871cb 460->463 464 7a871a5 460->464 465 7a87180-7a87186 461->465 468 7a871cd 463->468 469 7a871d2-7a871f1 463->469 464->463 474 7a87188-7a87189 465->474 475 7a87143-7a87147 465->475 472 7a87888-7a878d4 466->472 473 7a87747-7a8775c 466->473 468->469 470 7a871f8-7a87218 469->470 471 7a871f3 469->471 478 7a8721a 470->478 479 7a8721f 470->479 471->470 491 7a878fc-7a87917 472->491 492 7a878d6-7a878fa 472->492 480 7a8775e 473->480 481 7a87765-7a8786d 473->481 482 7a87223 474->482 476 7a87149-7a8714d 475->476 477 7a87151-7a87172 475->477 476->477 483 7a87179-7a8717d 477->483 484 7a87174 477->484 478->479 479->482 480->481 485 7a8780a-7a8783b 480->485 486 7a8776b-7a8779c 480->486 487 7a877a1-7a877d2 480->487 488 7a877d7-7a87808 480->488 494 7a87873 481->494 482->402 483->465 484->483 485->494 486->494 487->494 488->494 496 7a87920-7a879a4 491->496 492->496 494->466 501 7a879ab-7a879c3 496->501 501->394
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: TJcq$Te^q$pbq$xbaq
                                                                    • API String ID: 0-1954897716
                                                                    • Opcode ID: 11a4a44735666c249720429a94add63b51ffcbf9b9237a04456c3a2d2d4062bf
                                                                    • Instruction ID: edf4b418fb35107c2b3a0a48cefd94efb22fc17e23104b7b4d06b0446e96f3eb
                                                                    • Opcode Fuzzy Hash: 11a4a44735666c249720429a94add63b51ffcbf9b9237a04456c3a2d2d4062bf
                                                                    • Instruction Fuzzy Hash: D8B2B275E00628CFDB64DF69C984AD9BBB2FF89304F1581E9D509AB225DB319E81CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f24fca3464d2f7c431a55041c2351d4c1c5783dffe3d8b97e03577765c0a5f7b
                                                                    • Instruction ID: 4461736867bf0cd4127f78595a5797cc9bb972e61baaab2f22b191e2b29ccc6e
                                                                    • Opcode Fuzzy Hash: f24fca3464d2f7c431a55041c2351d4c1c5783dffe3d8b97e03577765c0a5f7b
                                                                    • Instruction Fuzzy Hash: AEE1DAB07017059FDB25DB79C4A4BAEB7F6AFC8700F148469D14A9B6D0DB35E801CB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c8c0533ab55c776179c78e204b9758aa11979c0145bb93f24fed5311b63d653c
                                                                    • Instruction ID: 077f832898537e732772fbf97160a88ed3f55e15a0d9c48f6e1bfba28629ab96
                                                                    • Opcode Fuzzy Hash: c8c0533ab55c776179c78e204b9758aa11979c0145bb93f24fed5311b63d653c
                                                                    • Instruction Fuzzy Hash: D9314FB1D053449FDB1ACFA6D8543DEBFF2AF86300F04C0A6D444AB2A5DB780945CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 296 13bd458-13bd4f7 GetCurrentProcess 300 13bd4f9-13bd4ff 296->300 301 13bd500-13bd534 GetCurrentThread 296->301 300->301 302 13bd53d-13bd571 GetCurrentProcess 301->302 303 13bd536-13bd53c 301->303 305 13bd57a-13bd595 call 13bd638 302->305 306 13bd573-13bd579 302->306 303->302 309 13bd59b-13bd5ca GetCurrentThreadId 305->309 306->305 310 13bd5cc-13bd5d2 309->310 311 13bd5d3-13bd635 309->311 310->311
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32 ref: 013BD4E6
                                                                    • GetCurrentThread.KERNEL32 ref: 013BD523
                                                                    • GetCurrentProcess.KERNEL32 ref: 013BD560
                                                                    • GetCurrentThreadId.KERNEL32 ref: 013BD5B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: Current$ProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2063062207-0
                                                                    • Opcode ID: 01a2b34ba602a0f03dbe758ac9587a283207ae5e0754e03f47463e1cd31d463c
                                                                    • Instruction ID: fbf0982c6716d2857f30eb27a3fb71942bec33c65816ff2cb050f2f33695821c
                                                                    • Opcode Fuzzy Hash: 01a2b34ba602a0f03dbe758ac9587a283207ae5e0754e03f47463e1cd31d463c
                                                                    • Instruction Fuzzy Hash: 4E5147B0900349DFDB14DFA9D988BDEBFF1EF48318F20845AE519A7290D7349984CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 318 13bd468-13bd4f7 GetCurrentProcess 322 13bd4f9-13bd4ff 318->322 323 13bd500-13bd534 GetCurrentThread 318->323 322->323 324 13bd53d-13bd571 GetCurrentProcess 323->324 325 13bd536-13bd53c 323->325 327 13bd57a-13bd595 call 13bd638 324->327 328 13bd573-13bd579 324->328 325->324 331 13bd59b-13bd5ca GetCurrentThreadId 327->331 328->327 332 13bd5cc-13bd5d2 331->332 333 13bd5d3-13bd635 331->333 332->333
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32 ref: 013BD4E6
                                                                    • GetCurrentThread.KERNEL32 ref: 013BD523
                                                                    • GetCurrentProcess.KERNEL32 ref: 013BD560
                                                                    • GetCurrentThreadId.KERNEL32 ref: 013BD5B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: Current$ProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2063062207-0
                                                                    • Opcode ID: 7f4fb88c0b66e1aa61c31bd5aaec3ef9d9ce373aa8105a912bb90ba431758127
                                                                    • Instruction ID: 122b6cfcbd2ce36223e1664bb1bc3a7b637d8679df0259701748d71dc2b65e3f
                                                                    • Opcode Fuzzy Hash: 7f4fb88c0b66e1aa61c31bd5aaec3ef9d9ce373aa8105a912bb90ba431758127
                                                                    • Instruction Fuzzy Hash: 1C5155B0900309DFDB18DFA9D948BDEBFF1EB88318F208459E519A7390DB349984CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 525 7d057d4-7d05875 527 7d05877-7d05881 525->527 528 7d058ae-7d058ce 525->528 527->528 529 7d05883-7d05885 527->529 535 7d058d0-7d058da 528->535 536 7d05907-7d05936 528->536 530 7d05887-7d05891 529->530 531 7d058a8-7d058ab 529->531 533 7d05893 530->533 534 7d05895-7d058a4 530->534 531->528 533->534 534->534 537 7d058a6 534->537 535->536 538 7d058dc-7d058de 535->538 542 7d05938-7d05942 536->542 543 7d0596f-7d05a29 CreateProcessA 536->543 537->531 540 7d058e0-7d058ea 538->540 541 7d05901-7d05904 538->541 544 7d058ec 540->544 545 7d058ee-7d058fd 540->545 541->536 542->543 547 7d05944-7d05946 542->547 556 7d05a32-7d05ab8 543->556 557 7d05a2b-7d05a31 543->557 544->545 545->545 546 7d058ff 545->546 546->541 548 7d05948-7d05952 547->548 549 7d05969-7d0596c 547->549 551 7d05954 548->551 552 7d05956-7d05965 548->552 549->543 551->552 552->552 554 7d05967 552->554 554->549 567 7d05ac8-7d05acc 556->567 568 7d05aba-7d05abe 556->568 557->556 570 7d05adc-7d05ae0 567->570 571 7d05ace-7d05ad2 567->571 568->567 569 7d05ac0 568->569 569->567 573 7d05af0-7d05af4 570->573 574 7d05ae2-7d05ae6 570->574 571->570 572 7d05ad4 571->572 572->570 576 7d05b06-7d05b0d 573->576 577 7d05af6-7d05afc 573->577 574->573 575 7d05ae8 574->575 575->573 578 7d05b24 576->578 579 7d05b0f-7d05b1e 576->579 577->576 581 7d05b25 578->581 579->578 581->581
                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07D05A16
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 44aedaccf6f37fe8dec36a6a285ee2b3e0a294110ead28ca008835a3b8d01aaf
                                                                    • Instruction ID: 59f94400fe6bd11b3ec3f4ec2c1f15e4268ef411a995360eb8a32926af6f6c46
                                                                    • Opcode Fuzzy Hash: 44aedaccf6f37fe8dec36a6a285ee2b3e0a294110ead28ca008835a3b8d01aaf
                                                                    • Instruction Fuzzy Hash: 65A149B1D0021ACFDB14DF68D881BDDFBB2BF48314F1485A9D81AA7280DB749995CF92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 582 7d057e0-7d05875 584 7d05877-7d05881 582->584 585 7d058ae-7d058ce 582->585 584->585 586 7d05883-7d05885 584->586 592 7d058d0-7d058da 585->592 593 7d05907-7d05936 585->593 587 7d05887-7d05891 586->587 588 7d058a8-7d058ab 586->588 590 7d05893 587->590 591 7d05895-7d058a4 587->591 588->585 590->591 591->591 594 7d058a6 591->594 592->593 595 7d058dc-7d058de 592->595 599 7d05938-7d05942 593->599 600 7d0596f-7d05a29 CreateProcessA 593->600 594->588 597 7d058e0-7d058ea 595->597 598 7d05901-7d05904 595->598 601 7d058ec 597->601 602 7d058ee-7d058fd 597->602 598->593 599->600 604 7d05944-7d05946 599->604 613 7d05a32-7d05ab8 600->613 614 7d05a2b-7d05a31 600->614 601->602 602->602 603 7d058ff 602->603 603->598 605 7d05948-7d05952 604->605 606 7d05969-7d0596c 604->606 608 7d05954 605->608 609 7d05956-7d05965 605->609 606->600 608->609 609->609 611 7d05967 609->611 611->606 624 7d05ac8-7d05acc 613->624 625 7d05aba-7d05abe 613->625 614->613 627 7d05adc-7d05ae0 624->627 628 7d05ace-7d05ad2 624->628 625->624 626 7d05ac0 625->626 626->624 630 7d05af0-7d05af4 627->630 631 7d05ae2-7d05ae6 627->631 628->627 629 7d05ad4 628->629 629->627 633 7d05b06-7d05b0d 630->633 634 7d05af6-7d05afc 630->634 631->630 632 7d05ae8 631->632 632->630 635 7d05b24 633->635 636 7d05b0f-7d05b1e 633->636 634->633 638 7d05b25 635->638 636->635 638->638
                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07D05A16
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 4c471d02dd04599fe32c0cf2f934a82dd493212432de99a02651324cfa2cc671
                                                                    • Instruction ID: b48747734d754614f2c8bf11989e720154bb08d0fcd5daac0bc43a310d1c1823
                                                                    • Opcode Fuzzy Hash: 4c471d02dd04599fe32c0cf2f934a82dd493212432de99a02651324cfa2cc671
                                                                    • Instruction Fuzzy Hash: 75915BB1D0021ACFDB14DF68D880BDDFBB2BF48314F1485A9D81AA7280DB749995CF92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 639 13badc8-13badd7 641 13badd9-13bade6 call 13b9740 639->641 642 13bae03-13bae07 639->642 649 13bade8 641->649 650 13badfc 641->650 643 13bae1b-13bae5c 642->643 644 13bae09-13bae13 642->644 651 13bae69-13bae77 643->651 652 13bae5e-13bae66 643->652 644->643 696 13badee call 13bb051 649->696 697 13badee call 13bb060 649->697 650->642 653 13bae9b-13bae9d 651->653 654 13bae79-13bae7e 651->654 652->651 656 13baea0-13baea7 653->656 657 13bae89 654->657 658 13bae80-13bae87 call 13ba110 654->658 655 13badf4-13badf6 655->650 659 13baf38-13baff8 655->659 662 13baea9-13baeb1 656->662 663 13baeb4-13baebb 656->663 660 13bae8b-13bae99 657->660 658->660 691 13baffa-13baffd 659->691 692 13bb000-13bb02b GetModuleHandleW 659->692 660->656 662->663 664 13baec8-13baeca call 13ba120 663->664 665 13baebd-13baec5 663->665 669 13baecf-13baed1 664->669 665->664 671 13baede-13baee3 669->671 672 13baed3-13baedb 669->672 674 13baf01-13baf0e 671->674 675 13baee5-13baeec 671->675 672->671 680 13baf31-13baf37 674->680 681 13baf10-13baf2e 674->681 675->674 676 13baeee-13baefe call 13ba130 call 13ba140 675->676 676->674 681->680 691->692 693 13bb02d-13bb033 692->693 694 13bb034-13bb048 692->694 693->694 696->655 697->655
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 013BB01E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 798ada78d07c965e04168baa4ca1f42681428b4f53da9b95679535e83c702158
                                                                    • Instruction ID: 073ab2ba7f228da7ace3664eb4cb24543d53d5619f902a8a6601ec7ea9f3816c
                                                                    • Opcode Fuzzy Hash: 798ada78d07c965e04168baa4ca1f42681428b4f53da9b95679535e83c702158
                                                                    • Instruction Fuzzy Hash: 70711470A00B059FD764DF29D49479ABBF5FF88308F00892DD68AD7A40EB75E949CB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 806 13b44b4-13b59d9 CreateActCtxA 809 13b59db-13b59e1 806->809 810 13b59e2-13b5a3c 806->810 809->810 817 13b5a4b-13b5a4f 810->817 818 13b5a3e-13b5a41 810->818 819 13b5a51-13b5a5d 817->819 820 13b5a60 817->820 818->817 819->820 822 13b5a61 820->822 822->822
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 013B59C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: b4daf427e10e76cb6d46ef16a3b30e0724b1f0973667d710ac9583f796c7f5be
                                                                    • Instruction ID: 48281f92f77f113b4e09060f215ca018830e004716f88440d01567081bf8b1d3
                                                                    • Opcode Fuzzy Hash: b4daf427e10e76cb6d46ef16a3b30e0724b1f0973667d710ac9583f796c7f5be
                                                                    • Instruction Fuzzy Hash: 6F41DFB1C0071DCADB24DFA9C884ADEBBB5BF49304F20806AD509AB251DBB56985CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 823 13b590c-13b5912 824 13b5919-13b59d9 CreateActCtxA 823->824 826 13b59db-13b59e1 824->826 827 13b59e2-13b5a3c 824->827 826->827 834 13b5a4b-13b5a4f 827->834 835 13b5a3e-13b5a41 827->835 836 13b5a51-13b5a5d 834->836 837 13b5a60 834->837 835->834 836->837 839 13b5a61 837->839 839->839
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 013B59C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: 34ed20afef5cd7707d42aea9cdc1cd2eab1293710bb9259f6d54693e61a4f1b7
                                                                    • Instruction ID: b05e37158ba5774894d3925eda2c7df874c73eb19aa50e4d5ae3bc71333f05e0
                                                                    • Opcode Fuzzy Hash: 34ed20afef5cd7707d42aea9cdc1cd2eab1293710bb9259f6d54693e61a4f1b7
                                                                    • Instruction Fuzzy Hash: B441F1B1C0071DCBDB24CFA9C884BCEBBB1BF49304F20806AD508AB251DB756946CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 840 7d05308-7d0530d 841 7d052b5-7d052df 840->841 842 7d0530f-7d0537f ResumeThread 840->842 845 7d052e1 841->845 846 7d052e6-7d052e9 841->846 850 7d05381-7d05387 842->850 851 7d05388-7d053ad 842->851 845->846 848 7d052f1-7d052fa 846->848 850->851
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: ResumeThread
                                                                    • String ID:
                                                                    • API String ID: 947044025-0
                                                                    • Opcode ID: 045e42a5ad5c3b0a86cdf5d760242d0866fd750e3ed032aa868de7597067140f
                                                                    • Instruction ID: abd85082a1bf3f3f5a9b9885db97537b2cdfdb53cd22a88573282d4eb0284290
                                                                    • Opcode Fuzzy Hash: 045e42a5ad5c3b0a86cdf5d760242d0866fd750e3ed032aa868de7597067140f
                                                                    • Instruction Fuzzy Hash: 83214AB5D003089BCB14DFA9D4457EEFFF5EB88310F108469D819A7740DA745940CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 855 7d05551-7d055a6 858 7d055b6-7d055f5 WriteProcessMemory 855->858 859 7d055a8-7d055b4 855->859 861 7d055f7-7d055fd 858->861 862 7d055fe-7d0562e 858->862 859->858 861->862
                                                                    APIs
                                                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07D055E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: 8b8c75e42df634acc87020d1925402dc90c546c9cb1aadcaf6d8c7e27755fe9a
                                                                    • Instruction ID: 1420a3c61a7a24c0d527c53549f87efdcc6fa478ab6a83fe419236eae4fb0977
                                                                    • Opcode Fuzzy Hash: 8b8c75e42df634acc87020d1925402dc90c546c9cb1aadcaf6d8c7e27755fe9a
                                                                    • Instruction Fuzzy Hash: AF2148B69003499FCB10DFA9D885BDEFBF5FF48310F10842AE919A7280C7789954CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 866 7d05558-7d055a6 868 7d055b6-7d055f5 WriteProcessMemory 866->868 869 7d055a8-7d055b4 866->869 871 7d055f7-7d055fd 868->871 872 7d055fe-7d0562e 868->872 869->868 871->872
                                                                    APIs
                                                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07D055E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: cc567857b8096fff5b3fa3c85794b3530fe7893c720b29ed4688e4c8692048b5
                                                                    • Instruction ID: 676a14f9bcc85f566b6055b1e0184fab2a9cb9379489f1dda3c568ee59d43530
                                                                    • Opcode Fuzzy Hash: cc567857b8096fff5b3fa3c85794b3530fe7893c720b29ed4688e4c8692048b5
                                                                    • Instruction Fuzzy Hash: 082127B59003499FCB10DFAAC885BDEBBF5FF48310F108429E919A7280C7789954CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 876 7d053b9-7d0540b 879 7d0541b-7d0544b Wow64SetThreadContext 876->879 880 7d0540d-7d05419 876->880 882 7d05454-7d05484 879->882 883 7d0544d-7d05453 879->883 880->879 883->882
                                                                    APIs
                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07D0543E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: ContextThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 983334009-0
                                                                    • Opcode ID: 680d3e9d7130abae0b21bcb3e640355417ae9ca16c1071af35f529e2a621c04d
                                                                    • Instruction ID: 2cf264cdcbf64cc1789a6c891dff2232589b606220e06cdb5aad5b0e18484786
                                                                    • Opcode Fuzzy Hash: 680d3e9d7130abae0b21bcb3e640355417ae9ca16c1071af35f529e2a621c04d
                                                                    • Instruction Fuzzy Hash: 3B215CB59003098FDB10DFAAC4857EEFBF4EF48324F108429D519A7281C7789544CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013BD737
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: 752eb50c7ba123515be3b44c5e97275350f55a55ad82aee4e5d7c0810bcedd97
                                                                    • Instruction ID: 33691cc21b8b8da94b179bc4f9f3d8d9bc0891e60d2ac8a8eb5d912aef6039b1
                                                                    • Opcode Fuzzy Hash: 752eb50c7ba123515be3b44c5e97275350f55a55ad82aee4e5d7c0810bcedd97
                                                                    • Instruction Fuzzy Hash: 6B21E4B59002489FDB10CFAAD985ADEFFF9EB48324F14841AE958B3350D378A944CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07D056C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessRead
                                                                    • String ID:
                                                                    • API String ID: 1726664587-0
                                                                    • Opcode ID: 071ea37155d558d3ed281ed31898129688982ad92b79ed528056b40757f360eb
                                                                    • Instruction ID: 1f76a223ca80f59bc109ce931da81aabdc786a9bfe23a2dea8fd3ce15e0138ea
                                                                    • Opcode Fuzzy Hash: 071ea37155d558d3ed281ed31898129688982ad92b79ed528056b40757f360eb
                                                                    • Instruction Fuzzy Hash: 3E2128B5C003499FCB10DFAAC845AEEFBF5FF48310F508429E919A7240C7389954DBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07D0543E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: ContextThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 983334009-0
                                                                    • Opcode ID: e2e67f787a596abcf9c795a4769bf5b721acacb8abe9d2a57f40e8b9834f0599
                                                                    • Instruction ID: f7c12c6e3fbc043da69261bc791ac5bcaa8e01504a8c59c74839ba08d9710745
                                                                    • Opcode Fuzzy Hash: e2e67f787a596abcf9c795a4769bf5b721acacb8abe9d2a57f40e8b9834f0599
                                                                    • Instruction Fuzzy Hash: 1D2129B19003098FDB14DFAAC485BEEFBF4EF88324F148429D559A7281CB789945CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 013BB01E
                                                                      • Part of subcall function 013BA168: LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,013BB099,00000800,00000000,00000000), ref: 013BB2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLibraryLoadModule
                                                                    • String ID:
                                                                    • API String ID: 4133054770-0
                                                                    • Opcode ID: ce784193f1f5e1946250242586d45d8b9cf58a6a0306d4e550025611c9b9a2fd
                                                                    • Instruction ID: ece1ab3b6c656dc1ecb088b4b94935b584bd445e6c1bf6be14916e271142592f
                                                                    • Opcode Fuzzy Hash: ce784193f1f5e1946250242586d45d8b9cf58a6a0306d4e550025611c9b9a2fd
                                                                    • Instruction Fuzzy Hash: F311D371A003058FD714DF6DD8847EAFBF5EBC5225F04806AD218D7645EB759809CB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 013BD737
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: da028b7c8ac1e87cd49b3997da10416802c83750c2d757b503eeae1435710a58
                                                                    • Instruction ID: 73d0afc0c6e5c6b92cffb7297b68a12d81aaa9b6160ec8c0255e0af609d6d181
                                                                    • Opcode Fuzzy Hash: da028b7c8ac1e87cd49b3997da10416802c83750c2d757b503eeae1435710a58
                                                                    • Instruction Fuzzy Hash: 9821E4B59002489FDB10CF9AD884ADEBFF4EB48324F14801AE958A3350D378A944CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07D05506
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 900e119f4fcd1be54123ded8b2227d091dd55ca92e17dbc2661ecd9c899aa38b
                                                                    • Instruction ID: 19a135861c4781f4622aab8912a1f57afef1b3937636d1d8d9a5b2b581352303
                                                                    • Opcode Fuzzy Hash: 900e119f4fcd1be54123ded8b2227d091dd55ca92e17dbc2661ecd9c899aa38b
                                                                    • Instruction Fuzzy Hash: 67115CB58002499FCB10DFA9D845ADFFFF5EF88320F108419E519A7250C7359554CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,013BB099,00000800,00000000,00000000), ref: 013BB2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: fd4e92015f310afb743fdc24e51e55da1bd7f4d68b34de88704c5afaede65e03
                                                                    • Instruction ID: d608d5e65b37dcacfd6449c2bf05ef40443232b9d09fa58be80a58735b112a9e
                                                                    • Opcode Fuzzy Hash: fd4e92015f310afb743fdc24e51e55da1bd7f4d68b34de88704c5afaede65e03
                                                                    • Instruction Fuzzy Hash: C41114B68003499FDB14CF9AC884ADEFBF4EB88314F10842AD619AB600D775A945CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,013BB099,00000800,00000000,00000000), ref: 013BB2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 9989d999356c2527221c3dbd2773cda8a9b7fd903002885f4389efb6f47ccac8
                                                                    • Instruction ID: eba94ea0c694a32348f775329132492ce4bb9d7b1076f25ac862edaef8360e9d
                                                                    • Opcode Fuzzy Hash: 9989d999356c2527221c3dbd2773cda8a9b7fd903002885f4389efb6f47ccac8
                                                                    • Instruction Fuzzy Hash: F91126B6C003098FDB14DFAAC884ADEFBF4EF88320F10852AD529A7640C775A545CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07D05506
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: fd7198a4da181a0f3cf689c6f2b4804945385e3cbaf5ee18576bce743272bc5b
                                                                    • Instruction ID: 721f6248752f68f99910677f6fa74b36a7790fdf54dbd6004e4fcf498a87d2b4
                                                                    • Opcode Fuzzy Hash: fd7198a4da181a0f3cf689c6f2b4804945385e3cbaf5ee18576bce743272bc5b
                                                                    • Instruction Fuzzy Hash: A71126B59002499FCB10DFAAC845ADEFFF5EB88320F108819E519A7290C775A954CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 07D09775
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: 64de7f458a2551aaa0add640c92068a0db21b8a28b228af5013eb2a664c7f574
                                                                    • Instruction ID: 26a4ef2c208898bb61a77a6f2fd3404e33149cb733474041fa95a62a3c6adc54
                                                                    • Opcode Fuzzy Hash: 64de7f458a2551aaa0add640c92068a0db21b8a28b228af5013eb2a664c7f574
                                                                    • Instruction Fuzzy Hash: A611F5B58003499FDB10DF99D889BDEFFF8EB48320F10841AE558A7641C375A584CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: ResumeThread
                                                                    • String ID:
                                                                    • API String ID: 947044025-0
                                                                    • Opcode ID: 0d4711dbdb713e8b84cddfd7d88e4c134799cb6167a6c51244b23f5f86529bf9
                                                                    • Instruction ID: 6bf708c23b68833be17ea65e74dd3f6e805ac930ce569cb7478ca0522810936d
                                                                    • Opcode Fuzzy Hash: 0d4711dbdb713e8b84cddfd7d88e4c134799cb6167a6c51244b23f5f86529bf9
                                                                    • Instruction Fuzzy Hash: 3A113AB1D003498FCB14DFAAC4457DEFBF5EB88324F208419D519A7280CB79A944CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 013BB01E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 0a5bc4c7f68e2bd5b2a1359004b0c20d008568fef1e5a1be3d1da28c0e9db39a
                                                                    • Instruction ID: 3b7530ceeb8404ad53c4312a35a412624c73d2ee3d04b886dd3510a3de8df7c8
                                                                    • Opcode Fuzzy Hash: 0a5bc4c7f68e2bd5b2a1359004b0c20d008568fef1e5a1be3d1da28c0e9db39a
                                                                    • Instruction Fuzzy Hash: 731110B5C003498FDB14CF9AC444BDEFBF4EB88324F10841AD529A7600D779A545CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 07D09775
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: a07e01565805fbc5fab1a86ae8bd545145e593393e4b410c1e29e2effd216bee
                                                                    • Instruction ID: 7713eb0e9aee3afb9de41e94f53e52074c15a358e66c67e8ed558b769015d418
                                                                    • Opcode Fuzzy Hash: a07e01565805fbc5fab1a86ae8bd545145e593393e4b410c1e29e2effd216bee
                                                                    • Instruction Fuzzy Hash: 5D1103B6800349DFDB10DF9AC889BDEFBF8EB88320F108459E559A7251C375A944CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: 6c9b01deead7177eddd5e02e81321ef4ee9a569e1f040ff5ef0d7bc5462537dd
                                                                    • Instruction ID: 0cf330eee8d1865bd82efd69ed311a3c44dd78a69aa0be210b933d40ecd47e8d
                                                                    • Opcode Fuzzy Hash: 6c9b01deead7177eddd5e02e81321ef4ee9a569e1f040ff5ef0d7bc5462537dd
                                                                    • Instruction Fuzzy Hash: 2C419171B102168FCB55EB7DD8885AEBBF6FFC4360B148929E429DB350EF3099068791
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: cf7763bacee7ed99ded888442cb133935c44e19c8c2cfec7ddb5ca5ae3ffb4e4
                                                                    • Instruction ID: 7c8464920a2981ba9ba69125660229b31af7a1a64f74eb4fdb8796c68fee5d17
                                                                    • Opcode Fuzzy Hash: cf7763bacee7ed99ded888442cb133935c44e19c8c2cfec7ddb5ca5ae3ffb4e4
                                                                    • Instruction Fuzzy Hash: 3B21DEB0E0464D8FDB48DFEAC5446DEFBF6BF89300F10802AD419AB354EB7419058B41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: 4cd9613ca6fe2f4fcb8cec862d491225fd57339b12da71adaaa5bc325c9419c7
                                                                    • Instruction ID: 6f0a8c744339c251742932588d5ff2ac001d7095b5340e92a719da067cdf49dc
                                                                    • Opcode Fuzzy Hash: 4cd9613ca6fe2f4fcb8cec862d491225fd57339b12da71adaaa5bc325c9419c7
                                                                    • Instruction Fuzzy Hash: C91121B1B0020A8FCB54EBB999505FFBAF6AFC5215F50447AC515E7340EB329D06CB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bf147a31bfacda2a25e8f0a43350e2b6e3073ecdf800b8f6797ef8936ff1e2a3
                                                                    • Instruction ID: 7705e41efa241e44fcbe24d8b3d6d919de33e0b5521e48d94d310326fdc33770
                                                                    • Opcode Fuzzy Hash: bf147a31bfacda2a25e8f0a43350e2b6e3073ecdf800b8f6797ef8936ff1e2a3
                                                                    • Instruction Fuzzy Hash: 3B51D4B4E14219DFCB44DFA9D5809ADBBF1FB89320F10A579E826AB310E7319941CF61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ab548f0699bc1eac521860ebe97a403a29a11ec14f97d3f793d9baadceafb31f
                                                                    • Instruction ID: 4b278d95df95e1a1b93e74afc7130636394883df08e62d58c4863ab0e5b8627d
                                                                    • Opcode Fuzzy Hash: ab548f0699bc1eac521860ebe97a403a29a11ec14f97d3f793d9baadceafb31f
                                                                    • Instruction Fuzzy Hash: F051E274E142089FCB48DFA9E884AEEBBF6FB89341F509019E815B7354CB389846CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9147e2e1a3f23d58782cce70194184cbff3a7b6875d11c0360eef36c11896fb1
                                                                    • Instruction ID: 2af480624b598600bc211ea6214abca5c3320fef02e8caa24858f8697f02832f
                                                                    • Opcode Fuzzy Hash: 9147e2e1a3f23d58782cce70194184cbff3a7b6875d11c0360eef36c11896fb1
                                                                    • Instruction Fuzzy Hash: A941D074E112199FCB00EFA8D484AEEBBB1FB8C320F509569E914B3354DB359995CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d920284630654a4369ae3633f94508c9186dea7182db41af9c31ea9f9c7c61bf
                                                                    • Instruction ID: cf9134adc0ba6fe98cbb449532364272d846c6e0a9c202e66c991fef0abf1ad7
                                                                    • Opcode Fuzzy Hash: d920284630654a4369ae3633f94508c9186dea7182db41af9c31ea9f9c7c61bf
                                                                    • Instruction Fuzzy Hash: 24316BB5900309AFCF14DFA9D844A9EBFF9EB48310F10842AE419A7310D735A940CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b32994a8b12edcea397b1c6c28662903f576fb0bfb3b22245e3c4dff5332fdfd
                                                                    • Instruction ID: 8c031ffa2108daec2604434da3f79f41a342092c0497586f23a3de7b5a19fb42
                                                                    • Opcode Fuzzy Hash: b32994a8b12edcea397b1c6c28662903f576fb0bfb3b22245e3c4dff5332fdfd
                                                                    • Instruction Fuzzy Hash: 363128B4E102199FCB41DF98E840AEEBBB1FF89300F108529E914A7354DA749A41CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663892353.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_135d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 645447bca82533712d4f82b810c14ce42813ee6ae49793171a6b7da21a0fab02
                                                                    • Instruction ID: 8f6d57af465aa6748b406cc4199b4e16fa2bf8365a8de707f67133572e02a1f6
                                                                    • Opcode Fuzzy Hash: 645447bca82533712d4f82b810c14ce42813ee6ae49793171a6b7da21a0fab02
                                                                    • Instruction Fuzzy Hash: 392121B1500244DFCB42DF58C8C0F26BF65FB8872CF20C969EC0A0A246C336D456CAA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663936013.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_136d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: adddf964a810a10eca2478699e98f5a9b7c2f7313222fc71858228a8bd96df8f
                                                                    • Instruction ID: 369617e5a0a8aa7296dfce26235193b06d90ec8cc80d7dd21068130816a8dc44
                                                                    • Opcode Fuzzy Hash: adddf964a810a10eca2478699e98f5a9b7c2f7313222fc71858228a8bd96df8f
                                                                    • Instruction Fuzzy Hash: 35210375604204DFCB15DF58D884B26BBA9FB84318F24C56DD88A0B34AC336D407CA61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0b7e87f6e80fc119e96f9b1d3ff950db8f69b55d3fe2a76365cf4ea98b5ad6ea
                                                                    • Instruction ID: f25f485d71937d6925563882a6ab56b795478f44c3e25bec9dae2643508fa236
                                                                    • Opcode Fuzzy Hash: 0b7e87f6e80fc119e96f9b1d3ff950db8f69b55d3fe2a76365cf4ea98b5ad6ea
                                                                    • Instruction Fuzzy Hash: D631C274A10508DFC748DF9EE689A99BBF1FF89300F6180D8E448AB365DB319E51DB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d8a4a113632fbef42142cb15f160b41e85f499c21b68dc56d169b39bbb116c1f
                                                                    • Instruction ID: 59e99dfc38e33716cf6659d942ddefff0b08b4a02e3bb881c4443957cdd23a41
                                                                    • Opcode Fuzzy Hash: d8a4a113632fbef42142cb15f160b41e85f499c21b68dc56d169b39bbb116c1f
                                                                    • Instruction Fuzzy Hash: 6A21DFB4C01218DFDB64DF9AC588B8EBFF5EB48314F24806AE418BB280CBB55845CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: abd554cc981548b66de007c69ca28b2bdb875dae0a58672aa7739744317eec49
                                                                    • Instruction ID: ce581c7960ed76ed08ce0dbefae4fd6737ad79b8779b3078e0475122e726f892
                                                                    • Opcode Fuzzy Hash: abd554cc981548b66de007c69ca28b2bdb875dae0a58672aa7739744317eec49
                                                                    • Instruction Fuzzy Hash: 362114B58003499FCB10DF9AD884ADEBFF4FB48320F108429E919B7201C379A954CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663892353.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_135d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction ID: 1190ccb8816bfac9e35e2926722d6bd031132632b5f8cd3ed9ffd091aacb3df3
                                                                    • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction Fuzzy Hash: 5E11E176504280CFCB02CF54D5C4B16BF72FB84728F24C6A9DC090B256C336D45ACBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663936013.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_136d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                    • Instruction ID: d58f4f85164f17415251393d71a29cceb438eb3de85f851d9568bab36b665a46
                                                                    • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                    • Instruction Fuzzy Hash: 96118E75604280DFDB16CF54D5C4B15BB72FB84318F24C6A9D8494B65AC33AD44ACB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a3d5be7a49788c052506481ebcdf71604290a9f516f1f30c455ec5b9d89b325f
                                                                    • Instruction ID: 12119b5c341d28af51a825c48b3a95d8f3240ee0ce4321a524013f5e7bc163f7
                                                                    • Opcode Fuzzy Hash: a3d5be7a49788c052506481ebcdf71604290a9f516f1f30c455ec5b9d89b325f
                                                                    • Instruction Fuzzy Hash: C211E674A24508EFC744DF9DE485999BFF4FB49310F5280D8E984A7355CB309A60CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663892353.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_135d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0b3be72bd22486938105705666741a9e8227b3aefe924c14b127353477783162
                                                                    • Instruction ID: 0300b712d2bc9a48bfcfb02f38062815ed98fbe3725afbd6a3559f58cf3d4167
                                                                    • Opcode Fuzzy Hash: 0b3be72bd22486938105705666741a9e8227b3aefe924c14b127353477783162
                                                                    • Instruction Fuzzy Hash: 0401F2710093889AE7508EA9CCC4F66BFE8DF50B29F18C81AED094A282C2789840C7B1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: be845a9800a131f0799a3253322c3ac3e3e6de9b3c50b243b984a5fe00320974
                                                                    • Instruction ID: 71a9cba7f09a4f402377ffd2e0eb372c08bded23a4edc6965da2ff53e1058895
                                                                    • Opcode Fuzzy Hash: be845a9800a131f0799a3253322c3ac3e3e6de9b3c50b243b984a5fe00320974
                                                                    • Instruction Fuzzy Hash: D00100B0900209DFDB14DF5AC4487DEBEF5FF89360F64C169E828AB290C7748984CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1663892353.000000000135D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0135D000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_135d000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 31ce8db1853e015be5c668f2602d7dee43bcaa700ce7a20c6925bfaedfe07879
                                                                    • Instruction ID: 8cc12dade474f0e3d398af4562db3e1bc38856cb48fef11bb99a182e53ec9d65
                                                                    • Opcode Fuzzy Hash: 31ce8db1853e015be5c668f2602d7dee43bcaa700ce7a20c6925bfaedfe07879
                                                                    • Instruction Fuzzy Hash: 1DF0C2720043849AE7108E19CC84B62FFD8EB80738F18C45AED084A282C3799840CAB0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5dd2a53a3255e2bc622bdad8bb84d40d3f48c33f8dac68a241c05607d3d27bc1
                                                                    • Instruction ID: 1333de6a23697d797f083eca9a6016b52e2892532270fff236e046e4fbc84e47
                                                                    • Opcode Fuzzy Hash: 5dd2a53a3255e2bc622bdad8bb84d40d3f48c33f8dac68a241c05607d3d27bc1
                                                                    • Instruction Fuzzy Hash: D9E01AB8918208EBCB04DF94D945DADBF75EB89320F54D199EC1417351CA329A61EF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 62881b1392d20029c7095e868c4ee5baa0a984507ebf2130ebc897d3a8235786
                                                                    • Instruction ID: fe7ff7a22152f093a97d97e3ac42a976aefd4cbad08f3e399e3a572e3938b8d1
                                                                    • Opcode Fuzzy Hash: 62881b1392d20029c7095e868c4ee5baa0a984507ebf2130ebc897d3a8235786
                                                                    • Instruction Fuzzy Hash: 01E08CF0419208EBCB40FFB8C5056AA7BFCEB0A301F0044A9A51997151EE314A089B92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0679dffe9e2e073988ade00a2309830b44c86b231eaa583325eee55be97f3080
                                                                    • Instruction ID: 6f1119b649a072910a20dd92b6fd9b5b99d887a8e436164f17bccbe36299212e
                                                                    • Opcode Fuzzy Hash: 0679dffe9e2e073988ade00a2309830b44c86b231eaa583325eee55be97f3080
                                                                    • Instruction Fuzzy Hash: 56E04F78918208EBCB44EF94D941DACBF75EB4A310F50D199EC1817351DA329A55EB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7924c106464640e9a6bf54e06c69b646b16f077e3a4d212a1950681aac32e872
                                                                    • Instruction ID: 0052840db8d72ddb28bcab519e9a7ef87c97a564b097d62d6fc0b13f9c93a208
                                                                    • Opcode Fuzzy Hash: 7924c106464640e9a6bf54e06c69b646b16f077e3a4d212a1950681aac32e872
                                                                    • Instruction Fuzzy Hash: 37E0C2F080A208EBC780FBF885016AEBBFCDF46200F1044A9941997111ED314A049B92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4c4632cb66d9c59c6031e099c2fc8f028d9233a07837682bc481589ea7560188
                                                                    • Instruction ID: d8573a3d7ae19cadbf06609721dc15f1e7124f61c930a135d24b29d7bd8527d4
                                                                    • Opcode Fuzzy Hash: 4c4632cb66d9c59c6031e099c2fc8f028d9233a07837682bc481589ea7560188
                                                                    • Instruction Fuzzy Hash: 56E0E57180420DEFCF06DFA4E94599D7F76FB49311F108059F90426220C7329AA1EFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ddc7b3124309ca4799ab5c7daacbf95f574baa7dcec7e63e04fd40a2cb14f7cc
                                                                    • Instruction ID: 4fbf15efe54e6b1359122fa11c2ceba5f2d00b7346fc93e969477f45094ad161
                                                                    • Opcode Fuzzy Hash: ddc7b3124309ca4799ab5c7daacbf95f574baa7dcec7e63e04fd40a2cb14f7cc
                                                                    • Instruction Fuzzy Hash: 36E086B4918108EBC704EF94D4419ACBF79EB55310F50C0ADDC0417341DA325E51DF80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f8d5d300f3590ee9bcc4f4a2c0eb7741d1d46b52bd3748db35fdbd71033d8354
                                                                    • Instruction ID: ab93eddd257361d15116f3149f1877d3dd616404411d131fd09da58f4b64a6e6
                                                                    • Opcode Fuzzy Hash: f8d5d300f3590ee9bcc4f4a2c0eb7741d1d46b52bd3748db35fdbd71033d8354
                                                                    • Instruction Fuzzy Hash: 25E012B4A19108EBCB44EF98D9415ACBBB9EF86314F50D5ADD81817341CE315E46DB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 16aac91f7b39d4b962a097e3db35c269a7e1853b7dbac012a6d98f060039bd55
                                                                    • Instruction ID: 0387d2ee6b4b8de3564d3ae26b347b7917e34a0b697b40896d379d4526567bb8
                                                                    • Opcode Fuzzy Hash: 16aac91f7b39d4b962a097e3db35c269a7e1853b7dbac012a6d98f060039bd55
                                                                    • Instruction Fuzzy Hash: 3DD0A9F004E10CEAC358FBA4D80ABBE7BBC8B82311F0052A4E82A231918B700D00A1A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a3249db1a533a8aaf37b0c078f1de6b61c253250e8bf3fb6fc53c1fd014e3543
                                                                    • Instruction ID: 3dcdb3d09b8bd00815b94dabe44d3a66a73590c4844f205427bed660d15309ec
                                                                    • Opcode Fuzzy Hash: a3249db1a533a8aaf37b0c078f1de6b61c253250e8bf3fb6fc53c1fd014e3543
                                                                    • Instruction Fuzzy Hash: EFC08CB001870487D2087B98F41F3643BB8E700316F400210F108010118E644080C696
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 60b7f8e3fcab4ba0fba3e30dd9649ef411761ecf4c9cb2aa88a0b24b6b14f49e
                                                                    • Instruction ID: 537661103bb271b8f43725175e163131577d53323453d15a806083fddd9d5ad8
                                                                    • Opcode Fuzzy Hash: 60b7f8e3fcab4ba0fba3e30dd9649ef411761ecf4c9cb2aa88a0b24b6b14f49e
                                                                    • Instruction Fuzzy Hash: 62E1D8B4E002198FCB14DFA9D590AAEFBF2FF89304F249159D414AB356DB30A941CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 97f1f38e499f6eaf46fbdb3aa7476ac269a0ad84061139fc70dd2e83ce8536cc
                                                                    • Instruction ID: 4bfb5ca92d42e89ba4ac6452c0400549cd14f4425ddce60e250dd75639a863c2
                                                                    • Opcode Fuzzy Hash: 97f1f38e499f6eaf46fbdb3aa7476ac269a0ad84061139fc70dd2e83ce8536cc
                                                                    • Instruction Fuzzy Hash: A0E1E7B4E002198FCB14DFA9D584AAEFBF2FF89304F249169D414AB355D734A941CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c56679e18fc326b15874c36409f3bc095143f99af5b2a3b88f97a0b2776136e8
                                                                    • Instruction ID: 0f1e287e4086138afd39e6c59d699e48fa4a9cd53e8440e450b763738ae27b90
                                                                    • Opcode Fuzzy Hash: c56679e18fc326b15874c36409f3bc095143f99af5b2a3b88f97a0b2776136e8
                                                                    • Instruction Fuzzy Hash: 66E1D4B4E012198FCB14DFA9D594AAEFBF2BF89304F249169D414AB355DB30AD41CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2bbc231f4001cabb249cf4beebfb77604b93706b2b8197301d52686c38f88323
                                                                    • Instruction ID: 07ec15f8b148aca42868dac888ec3ec2e2cac090df2198c32d8c4c252da9c852
                                                                    • Opcode Fuzzy Hash: 2bbc231f4001cabb249cf4beebfb77604b93706b2b8197301d52686c38f88323
                                                                    • Instruction Fuzzy Hash: 5BE1D7B4E002598FCB14DFA9D580AAEFBF2FF89304F249169D514AB355DB31A941CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fc1ff728f9c335be94a98edb9833630670163a8c361ee707ce27c4c18139b9cf
                                                                    • Instruction ID: e5168fdfcf1438854caca7037279df29b29b66376b007ca0899cf528e56bdb27
                                                                    • Opcode Fuzzy Hash: fc1ff728f9c335be94a98edb9833630670163a8c361ee707ce27c4c18139b9cf
                                                                    • Instruction Fuzzy Hash: 3AE1E6B4E002198FCB14DFA9D594AAEFBF2FF89304F249169D414AB355D734A981CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8df54ce1d4fecfa5917f1a0715e8219bd5573aeaa231b82487559e4dd097c745
                                                                    • Instruction ID: a0e06530c25747e4ef4ca4e90657eb8908383e8f2c5858bf0847cb11dfbd0815
                                                                    • Opcode Fuzzy Hash: 8df54ce1d4fecfa5917f1a0715e8219bd5573aeaa231b82487559e4dd097c745
                                                                    • Instruction Fuzzy Hash: 5ED1C231D2075ACACB15EBA8D994A9DB7B1FF95300F50C79AE4093B210EB706EC5CB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1664052667.00000000013B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013B0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_13b0000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 50139d8dcbc9008b2912e6a3d5f65c161037649881551687d3750fe8dae70a58
                                                                    • Instruction ID: f1566188b004ab7dd2877fab734ddcc75700384d5a7de8349699e9e46eb22bd4
                                                                    • Opcode Fuzzy Hash: 50139d8dcbc9008b2912e6a3d5f65c161037649881551687d3750fe8dae70a58
                                                                    • Instruction Fuzzy Hash: E0A1B635E0021ACFCF15DFB8C8805DEBBB6FF84304B15956AEA01AB665EB71D915CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b1d022ccdb7dfcba6f28dd596d8a221a5ea3da74a2aa76c2f2b0d1d8f06fbd21
                                                                    • Instruction ID: 737fe658e50f43041dee0365d7eda9bc59e433ea7ac1caf39e1c804b54e4ece4
                                                                    • Opcode Fuzzy Hash: b1d022ccdb7dfcba6f28dd596d8a221a5ea3da74a2aa76c2f2b0d1d8f06fbd21
                                                                    • Instruction Fuzzy Hash: CB51E4B4E051198BCB48DFAAD5809AEFBF2FF89310F24D165D419A7355DB30A942CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1673544714.0000000007D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D00000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7d00000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 57f21fe4d24dd5f68479b96bcd9fed8b9e2185c67dd61e235ce974d57be8b857
                                                                    • Instruction ID: 52cea44e01bffd5f2e8ca0f9b60456aa2d22c36fe065fd0c07d27d45a89b9e09
                                                                    • Opcode Fuzzy Hash: 57f21fe4d24dd5f68479b96bcd9fed8b9e2185c67dd61e235ce974d57be8b857
                                                                    • Instruction Fuzzy Hash: 4151FAB4E002198BDB14CFA9D9806AEFBF2FF89304F24D169D418AB356D7359941CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b179eb7f4e9895e9b346fab45d53104144f985dca8c96ec3982ed1351be57941
                                                                    • Instruction ID: e06645e3a7d4e4fa8371f5b006236eb1509fd1f04bec96b7f8eb92fdcd885d2b
                                                                    • Opcode Fuzzy Hash: b179eb7f4e9895e9b346fab45d53104144f985dca8c96ec3982ed1351be57941
                                                                    • Instruction Fuzzy Hash: B15174B4D016288BEB68DF2AD95479DBAF3BFC8200F14C1EAD40DA7264DB750A958F40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.1672452366.0000000007A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_7a80000_fatura.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5a64c4640e4f427a7ecfe9278cb29eee3e4445d2c1e18d190f5b8b8303dd7e85
                                                                    • Instruction ID: dbee94bf1b9bf5c8a6bb1a75c87d9de5957635c500d92fab6f9a24fd63ed0e3b
                                                                    • Opcode Fuzzy Hash: 5a64c4640e4f427a7ecfe9278cb29eee3e4445d2c1e18d190f5b8b8303dd7e85
                                                                    • Instruction Fuzzy Hash: A74199B1D057588FEB59CF6BCC5478AFAF3AFC9200F18C1AAC418AB265DB7509958F01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:10.8%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:236
                                                                    Total number of Limit Nodes:7
                                                                    execution_graph 24859 c84668 24860 c8467a 24859->24860 24861 c84686 24860->24861 24865 c84778 24860->24865 24870 c83e34 24861->24870 24863 c846a5 24866 c8479d 24865->24866 24874 c84888 24866->24874 24878 c84879 24866->24878 24871 c83e3f 24870->24871 24886 c85c44 24871->24886 24873 c8705c 24873->24863 24876 c848af 24874->24876 24875 c8498c 24875->24875 24876->24875 24882 c844b4 24876->24882 24880 c848af 24878->24880 24879 c8498c 24880->24879 24881 c844b4 CreateActCtxA 24880->24881 24881->24879 24883 c85918 CreateActCtxA 24882->24883 24885 c859db 24883->24885 24887 c85c4f 24886->24887 24890 c85c74 24887->24890 24889 c8710d 24889->24873 24891 c85c7f 24890->24891 24894 c85ca4 24891->24894 24893 c871e2 24893->24889 24895 c85caf 24894->24895 24898 c85cd4 24895->24898 24897 c872e5 24897->24893 24899 c85cdf 24898->24899 24901 c885eb 24899->24901 24904 c8ac98 24899->24904 24900 c88629 24900->24897 24901->24900 24908 c8cd97 24901->24908 24916 c8acc0 24904->24916 24921 c8acd0 24904->24921 24905 c8acae 24905->24901 24909 c8cdb9 24908->24909 24910 c8cddd 24909->24910 24912 c8ce7d 24909->24912 24953 c8cf48 24909->24953 24957 c8cf38 24909->24957 24961 c8cfc7 24909->24961 24910->24900 24911 c8cfc7 3 API calls 24911->24912 24912->24911 24917 c8acd0 24916->24917 24925 c8adc8 24917->24925 24933 c8adb7 24917->24933 24918 c8acdf 24918->24905 24923 c8adc8 2 API calls 24921->24923 24924 c8adb7 2 API calls 24921->24924 24922 c8acdf 24922->24905 24923->24922 24924->24922 24926 c8add9 24925->24926 24927 c8adfc 24925->24927 24926->24927 24941 c8b060 24926->24941 24945 c8b051 24926->24945 24927->24918 24928 c8adf4 24928->24927 24929 c8b000 GetModuleHandleW 24928->24929 24930 c8b02d 24929->24930 24930->24918 24934 c8add9 24933->24934 24935 c8adfc 24933->24935 24934->24935 24939 c8b060 LoadLibraryExW 24934->24939 24940 c8b051 LoadLibraryExW 24934->24940 24935->24918 24936 c8adf4 24936->24935 24937 c8b000 GetModuleHandleW 24936->24937 24938 c8b02d 24937->24938 24938->24918 24939->24936 24940->24936 24942 c8b074 24941->24942 24944 c8b099 24942->24944 24949 c8a168 24942->24949 24944->24928 24946 c8b074 24945->24946 24947 c8a168 LoadLibraryExW 24946->24947 24948 c8b099 24946->24948 24947->24948 24948->24928 24950 c8b240 LoadLibraryExW 24949->24950 24952 c8b2b9 24950->24952 24952->24944 24954 c8cf55 24953->24954 24955 c8cf8f 24954->24955 24966 c8bb20 24954->24966 24955->24912 24958 c8cf55 24957->24958 24959 c8cf8f 24958->24959 24960 c8bb20 3 API calls 24958->24960 24959->24912 24960->24959 24962 c8cfd5 24961->24962 24963 c8cf60 24961->24963 24962->24912 24964 c8cf8f 24963->24964 24965 c8bb20 3 API calls 24963->24965 24964->24912 24965->24964 24967 c8bb25 24966->24967 24969 c8dca8 24967->24969 24970 c8d144 24967->24970 24969->24969 24971 c8d14f 24970->24971 24972 c85cd4 3 API calls 24971->24972 24973 c8dd17 24972->24973 24973->24969 24974 c8d468 24975 c8d4ae GetCurrentProcess 24974->24975 24977 c8d4f9 24975->24977 24978 c8d500 GetCurrentThread 24975->24978 24977->24978 24979 c8d53d GetCurrentProcess 24978->24979 24980 c8d536 24978->24980 24981 c8d573 24979->24981 24980->24979 24982 c8d59b GetCurrentThreadId 24981->24982 24983 c8d5cc 24982->24983 24688 7335d60 24689 7335d7c 24688->24689 24693 73374c1 24689->24693 24697 73374d0 24689->24697 24690 7335d8c 24694 73374ea 24693->24694 24701 73377f1 24694->24701 24695 733750e 24695->24690 24698 73374ea 24697->24698 24700 73377f1 12 API calls 24698->24700 24699 733750e 24699->24690 24700->24699 24702 7337801 24701->24702 24703 7337827 24702->24703 24721 73379d3 24702->24721 24725 7337c0d 24702->24725 24730 7337b8f 24702->24730 24735 7337a2f 24702->24735 24740 7337c48 24702->24740 24745 733796a 24702->24745 24749 7337d4b 24702->24749 24754 7337e85 24702->24754 24759 7337b5d 24702->24759 24764 733803d 24702->24764 24769 7337fbe 24702->24769 24774 7337e9f 24702->24774 24779 7337bfa 24702->24779 24783 7337cf6 24702->24783 24788 7337ab0 24702->24788 24792 7337b10 24702->24792 24802 7337c73 24702->24802 24703->24695 24722 73379c9 24721->24722 24811 73353c0 24722->24811 24815 73353b9 24722->24815 24726 7337b96 24725->24726 24819 7335551 24726->24819 24823 7335558 24726->24823 24727 7337afd 24727->24703 24731 7337b95 24730->24731 24733 7335551 WriteProcessMemory 24731->24733 24734 7335558 WriteProcessMemory 24731->24734 24732 7337afd 24732->24703 24733->24732 24734->24732 24736 7337a49 24735->24736 24827 7335310 24736->24827 24831 7335308 24736->24831 24737 7337ff0 24741 7337c4e 24740->24741 24743 7335310 ResumeThread 24741->24743 24744 7335308 ResumeThread 24741->24744 24742 7337ff0 24743->24742 24744->24742 24835 73357e0 24745->24835 24839 73357d4 24745->24839 24750 7337d51 24749->24750 24843 7335641 24750->24843 24847 7335648 24750->24847 24751 7337b56 24751->24703 24755 7337c5f 24754->24755 24757 7335310 ResumeThread 24755->24757 24758 7335308 ResumeThread 24755->24758 24756 7337ff0 24756->24756 24757->24756 24758->24756 24760 7337ec4 24759->24760 24762 7335551 WriteProcessMemory 24760->24762 24763 7335558 WriteProcessMemory 24760->24763 24761 733806c 24762->24761 24763->24761 24765 733813e 24764->24765 24851 7335498 24765->24851 24855 7335491 24765->24855 24766 733815c 24770 7337fdb 24769->24770 24772 7335310 ResumeThread 24770->24772 24773 7335308 ResumeThread 24770->24773 24771 7337ff0 24772->24771 24773->24771 24775 7337ea5 24774->24775 24777 7335551 WriteProcessMemory 24775->24777 24778 7335558 WriteProcessMemory 24775->24778 24776 733806c 24777->24776 24778->24776 24780 73379c9 24779->24780 24781 73353c0 Wow64SetThreadContext 24780->24781 24782 73353b9 Wow64SetThreadContext 24780->24782 24781->24780 24782->24780 24784 7337d52 24783->24784 24785 7337b56 24784->24785 24786 7335641 ReadProcessMemory 24784->24786 24787 7335648 ReadProcessMemory 24784->24787 24785->24703 24786->24785 24787->24785 24790 7335551 WriteProcessMemory 24788->24790 24791 7335558 WriteProcessMemory 24788->24791 24789 7337a1b 24790->24789 24791->24789 24793 7337b15 24792->24793 24794 7337c91 24793->24794 24796 7337a2e 24793->24796 24798 73353c0 Wow64SetThreadContext 24794->24798 24799 73353b9 Wow64SetThreadContext 24794->24799 24795 733825c 24800 7335310 ResumeThread 24796->24800 24801 7335308 ResumeThread 24796->24801 24797 7337ff0 24798->24795 24799->24795 24800->24797 24801->24797 24803 7337c91 24802->24803 24805 7337a2e 24802->24805 24809 73353c0 Wow64SetThreadContext 24803->24809 24810 73353b9 Wow64SetThreadContext 24803->24810 24804 733825c 24807 7335310 ResumeThread 24805->24807 24808 7335308 ResumeThread 24805->24808 24806 7337ff0 24807->24806 24808->24806 24809->24804 24810->24804 24812 7335405 Wow64SetThreadContext 24811->24812 24814 733544d 24812->24814 24814->24722 24816 73353c0 Wow64SetThreadContext 24815->24816 24818 733544d 24816->24818 24818->24722 24820 7335558 WriteProcessMemory 24819->24820 24822 73355f7 24820->24822 24822->24727 24824 73355a0 WriteProcessMemory 24823->24824 24826 73355f7 24824->24826 24826->24727 24828 7335350 ResumeThread 24827->24828 24830 7335381 24828->24830 24830->24737 24832 7335303 24831->24832 24832->24831 24833 733535a ResumeThread 24832->24833 24834 7335381 24833->24834 24834->24737 24836 7335869 24835->24836 24836->24836 24837 73359ce CreateProcessA 24836->24837 24838 7335a2b 24837->24838 24840 7335869 24839->24840 24840->24840 24841 73359ce CreateProcessA 24840->24841 24842 7335a2b 24841->24842 24844 733563b 24843->24844 24844->24843 24845 73356a6 ReadProcessMemory 24844->24845 24846 73356d7 24845->24846 24846->24751 24848 7335693 ReadProcessMemory 24847->24848 24850 73356d7 24848->24850 24850->24751 24852 73354d8 VirtualAllocEx 24851->24852 24854 7335515 24852->24854 24854->24766 24856 73354d8 VirtualAllocEx 24855->24856 24858 7335515 24856->24858 24858->24766 24984 c8d6b0 DuplicateHandle 24985 c8d746 24984->24985 24681 7338638 24682 73387c3 24681->24682 24684 733865e 24681->24684 24684->24682 24685 7336bcc 24684->24685 24686 73388b8 PostMessageW 24685->24686 24687 7338924 24686->24687 24687->24684

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 338 6f66a00-6f66a21 339 6f66a23 338->339 340 6f66a28-6f66b14 338->340 339->340 342 6f67346-6f6736e 340->342 343 6f66b1a-6f66c71 340->343 346 6f679cd-6f679d6 342->346 387 6f66c77-6f66cd2 343->387 388 6f67314-6f67343 343->388 347 6f6737c-6f67385 346->347 348 6f679dc-6f679f3 346->348 351 6f67387 347->351 352 6f6738c-6f67480 347->352 351->352 369 6f67482-6f6748e 352->369 370 6f674aa 352->370 373 6f67490-6f67496 369->373 374 6f67498-6f6749e 369->374 372 6f674b0-6f674d0 370->372 379 6f674d2-6f6752b 372->379 380 6f67530-6f675aa 372->380 376 6f674a8 373->376 374->376 376->372 393 6f679ca 379->393 398 6f67601-6f67644 380->398 399 6f675ac-6f675ff 380->399 396 6f66cd7-6f66ce2 387->396 397 6f66cd4 387->397 388->342 393->346 400 6f67226-6f6722c 396->400 397->396 424 6f6764f-6f67655 398->424 399->424 402 6f66ce7-6f66d05 400->402 403 6f67232-6f672af 400->403 405 6f66d07-6f66d0b 402->405 406 6f66d5c-6f66d71 402->406 442 6f672fe-6f67304 403->442 405->406 411 6f66d0d-6f66d18 405->411 408 6f66d73 406->408 409 6f66d78-6f66d8e 406->409 408->409 415 6f66d95-6f66dac 409->415 416 6f66d90 409->416 412 6f66d4e-6f66d54 411->412 417 6f66d56-6f66d57 412->417 418 6f66d1a-6f66d1e 412->418 419 6f66db3-6f66dc9 415->419 420 6f66dae 415->420 416->415 427 6f66dda-6f66e4b 417->427 422 6f66d24-6f66d3c 418->422 423 6f66d20 418->423 425 6f66dd0-6f66dd7 419->425 426 6f66dcb 419->426 420->419 430 6f66d43-6f66d4b 422->430 431 6f66d3e 422->431 423->422 432 6f676ac-6f676b8 424->432 425->427 426->425 433 6f66e61-6f66fd9 427->433 434 6f66e4d 427->434 430->412 431->430 436 6f67657-6f67679 432->436 437 6f676ba-6f67742 432->437 443 6f66fef-6f6712a 433->443 444 6f66fdb 433->444 434->433 435 6f66e4f-6f66e5b 434->435 435->433 439 6f67680-6f676a9 436->439 440 6f6767b 436->440 466 6f67879-6f67882 437->466 439->432 440->439 447 6f67306-6f6730c 442->447 448 6f672b1-6f672fb 442->448 456 6f6718e-6f671a3 443->456 457 6f6712c-6f67130 443->457 444->443 449 6f66fdd-6f66fe9 444->449 447->388 448->442 449->443 461 6f671a5 456->461 462 6f671aa-6f671cb 456->462 457->456 459 6f67132-6f67141 457->459 465 6f67180-6f67186 459->465 461->462 463 6f671d2-6f671f1 462->463 464 6f671cd 462->464 468 6f671f3 463->468 469 6f671f8-6f67218 463->469 464->463 472 6f67143-6f67147 465->472 473 6f67188-6f67189 465->473 470 6f67747-6f6775c 466->470 471 6f67888-6f678d4 466->471 468->469 476 6f6721f 469->476 477 6f6721a 469->477 478 6f67765-6f6786d 470->478 479 6f6775e 470->479 489 6f678d6-6f678fa 471->489 490 6f678fc-6f67917 471->490 474 6f67151-6f67172 472->474 475 6f67149-6f6714d 472->475 480 6f67223 473->480 481 6f67174 474->481 482 6f67179-6f6717d 474->482 475->474 476->480 477->476 493 6f67873 478->493 479->478 483 6f677d7-6f67808 479->483 484 6f677a1-6f677d2 479->484 485 6f6780a-6f6783b 479->485 486 6f6776b-6f6779c 479->486 480->400 481->482 482->465 483->493 484->493 485->493 486->493 495 6f67920-6f679a4 489->495 490->495 493->466 499 6f679ab-6f679c3 495->499 499->393
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: TJcq$Te^q$pbq$xbaq
                                                                    • API String ID: 0-1954897716
                                                                    • Opcode ID: 570f74562ebe2253c7f8a131be0c2f3a6985b1a0d38e10d5aa307441d2a39f09
                                                                    • Instruction ID: fff745fd5b09f44f18c5ca1284a906b0640671abb848a6604c7d33e7cf52489f
                                                                    • Opcode Fuzzy Hash: 570f74562ebe2253c7f8a131be0c2f3a6985b1a0d38e10d5aa307441d2a39f09
                                                                    • Instruction Fuzzy Hash: EEB2B575E00228DFDB64DF69C984AD9BBB2FF89304F1581E5E509AB225DB319E81CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 294 c8d458-c8d4f7 GetCurrentProcess 298 c8d4f9-c8d4ff 294->298 299 c8d500-c8d534 GetCurrentThread 294->299 298->299 300 c8d53d-c8d571 GetCurrentProcess 299->300 301 c8d536-c8d53c 299->301 303 c8d57a-c8d595 call c8d638 300->303 304 c8d573-c8d579 300->304 301->300 307 c8d59b-c8d5ca GetCurrentThreadId 303->307 304->303 308 c8d5cc-c8d5d2 307->308 309 c8d5d3-c8d635 307->309 308->309
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32 ref: 00C8D4E6
                                                                    • GetCurrentThread.KERNEL32 ref: 00C8D523
                                                                    • GetCurrentProcess.KERNEL32 ref: 00C8D560
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00C8D5B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: Current$ProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2063062207-0
                                                                    • Opcode ID: 174c206b4acd9b67240c6c0d9337d19bc9aa7e6a6f2beadf1ec7b305561b62d4
                                                                    • Instruction ID: e55039dabda295b11b5d051f5667b59548f29ce6fb274229e9d5909974c3839f
                                                                    • Opcode Fuzzy Hash: 174c206b4acd9b67240c6c0d9337d19bc9aa7e6a6f2beadf1ec7b305561b62d4
                                                                    • Instruction Fuzzy Hash: E15179B09003498FDB14DFA9D548BAEBFF1EF48308F24849AE059A7391CB749945CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 316 c8d468-c8d4f7 GetCurrentProcess 320 c8d4f9-c8d4ff 316->320 321 c8d500-c8d534 GetCurrentThread 316->321 320->321 322 c8d53d-c8d571 GetCurrentProcess 321->322 323 c8d536-c8d53c 321->323 325 c8d57a-c8d595 call c8d638 322->325 326 c8d573-c8d579 322->326 323->322 329 c8d59b-c8d5ca GetCurrentThreadId 325->329 326->325 330 c8d5cc-c8d5d2 329->330 331 c8d5d3-c8d635 329->331 330->331
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32 ref: 00C8D4E6
                                                                    • GetCurrentThread.KERNEL32 ref: 00C8D523
                                                                    • GetCurrentProcess.KERNEL32 ref: 00C8D560
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00C8D5B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: Current$ProcessThread
                                                                    • String ID:
                                                                    • API String ID: 2063062207-0
                                                                    • Opcode ID: 13f89f746d68b4823115bbe57024a9ecf97c96efc38e327369ab4328c1d3c206
                                                                    • Instruction ID: 2cfd218705719b4323d319daf79abee2cac09b3ad5ebc0890a5f6ee8b6296e04
                                                                    • Opcode Fuzzy Hash: 13f89f746d68b4823115bbe57024a9ecf97c96efc38e327369ab4328c1d3c206
                                                                    • Instruction Fuzzy Hash: E65138B09003098FDB14DFAAD548B9EBBF1FF48318F24845AE01AA7390DB749945CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 522 73357d4-7335875 524 7335877-7335881 522->524 525 73358ae-73358ce 522->525 524->525 526 7335883-7335885 524->526 532 73358d0-73358da 525->532 533 7335907-7335936 525->533 527 7335887-7335891 526->527 528 73358a8-73358ab 526->528 530 7335893 527->530 531 7335895-73358a4 527->531 528->525 530->531 531->531 534 73358a6 531->534 532->533 535 73358dc-73358de 532->535 539 7335938-7335942 533->539 540 733596f-7335a29 CreateProcessA 533->540 534->528 537 7335901-7335904 535->537 538 73358e0-73358ea 535->538 537->533 541 73358ee-73358fd 538->541 542 73358ec 538->542 539->540 543 7335944-7335946 539->543 553 7335a32-7335ab8 540->553 554 7335a2b-7335a31 540->554 541->541 544 73358ff 541->544 542->541 545 7335969-733596c 543->545 546 7335948-7335952 543->546 544->537 545->540 548 7335956-7335965 546->548 549 7335954 546->549 548->548 550 7335967 548->550 549->548 550->545 564 7335aba-7335abe 553->564 565 7335ac8-7335acc 553->565 554->553 564->565 566 7335ac0 564->566 567 7335ace-7335ad2 565->567 568 7335adc-7335ae0 565->568 566->565 567->568 569 7335ad4 567->569 570 7335ae2-7335ae6 568->570 571 7335af0-7335af4 568->571 569->568 570->571 572 7335ae8 570->572 573 7335b06-7335b0d 571->573 574 7335af6-7335afc 571->574 572->571 575 7335b24 573->575 576 7335b0f-7335b1e 573->576 574->573 578 7335b25 575->578 576->575 578->578
                                                                    APIs
                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07335A16
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 8030db31a3ceff58e9363d860d8f94ca6edbba37ca93ae37e748244cc33f8abf
                                                                    • Instruction ID: 3c026be1e4c559ff8709ea0b411108509418dab86470e8580249ea9d501ced16
                                                                    • Opcode Fuzzy Hash: 8030db31a3ceff58e9363d860d8f94ca6edbba37ca93ae37e748244cc33f8abf
                                                                    • Instruction Fuzzy Hash: 74915DB1D0021ACFEB24DF68CC417EDBBB2BF48314F148569E859A7240DB749995CF92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 579 73357e0-7335875 581 7335877-7335881 579->581 582 73358ae-73358ce 579->582 581->582 583 7335883-7335885 581->583 589 73358d0-73358da 582->589 590 7335907-7335936 582->590 584 7335887-7335891 583->584 585 73358a8-73358ab 583->585 587 7335893 584->587 588 7335895-73358a4 584->588 585->582 587->588 588->588 591 73358a6 588->591 589->590 592 73358dc-73358de 589->592 596 7335938-7335942 590->596 597 733596f-7335a29 CreateProcessA 590->597 591->585 594 7335901-7335904 592->594 595 73358e0-73358ea 592->595 594->590 598 73358ee-73358fd 595->598 599 73358ec 595->599 596->597 600 7335944-7335946 596->600 610 7335a32-7335ab8 597->610 611 7335a2b-7335a31 597->611 598->598 601 73358ff 598->601 599->598 602 7335969-733596c 600->602 603 7335948-7335952 600->603 601->594 602->597 605 7335956-7335965 603->605 606 7335954 603->606 605->605 607 7335967 605->607 606->605 607->602 621 7335aba-7335abe 610->621 622 7335ac8-7335acc 610->622 611->610 621->622 623 7335ac0 621->623 624 7335ace-7335ad2 622->624 625 7335adc-7335ae0 622->625 623->622 624->625 626 7335ad4 624->626 627 7335ae2-7335ae6 625->627 628 7335af0-7335af4 625->628 626->625 627->628 629 7335ae8 627->629 630 7335b06-7335b0d 628->630 631 7335af6-7335afc 628->631 629->628 632 7335b24 630->632 633 7335b0f-7335b1e 630->633 631->630 635 7335b25 632->635 633->632 635->635
                                                                    APIs
                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07335A16
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID:
                                                                    • API String ID: 963392458-0
                                                                    • Opcode ID: 2b030531adf4fb7a0d16736c04520e753b38f00a4b65e7bdab5cbf326ee9f527
                                                                    • Instruction ID: fc5aa3436a4c0b876247342bd7f2559b00a2bde967c3fea7f2445c288f0d78c3
                                                                    • Opcode Fuzzy Hash: 2b030531adf4fb7a0d16736c04520e753b38f00a4b65e7bdab5cbf326ee9f527
                                                                    • Instruction Fuzzy Hash: E0914DB1D0021ACFEB24DF68CC417EDBBB2BF48314F148569E859A7280DB749995CF92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 636 c8adc8-c8add7 637 c8add9-c8ade6 call c89740 636->637 638 c8ae03-c8ae07 636->638 645 c8ade8 637->645 646 c8adfc 637->646 639 c8ae09-c8ae13 638->639 640 c8ae1b-c8ae5c 638->640 639->640 647 c8ae69-c8ae77 640->647 648 c8ae5e-c8ae66 640->648 691 c8adee call c8b060 645->691 692 c8adee call c8b051 645->692 646->638 650 c8ae79-c8ae7e 647->650 651 c8ae9b-c8ae9d 647->651 648->647 649 c8adf4-c8adf6 649->646 652 c8af38-c8aff8 649->652 654 c8ae89 650->654 655 c8ae80-c8ae87 call c8a110 650->655 653 c8aea0-c8aea7 651->653 686 c8affa-c8affd 652->686 687 c8b000-c8b02b GetModuleHandleW 652->687 657 c8aea9-c8aeb1 653->657 658 c8aeb4-c8aebb 653->658 656 c8ae8b-c8ae99 654->656 655->656 656->653 657->658 660 c8aec8-c8aeca call c8a120 658->660 661 c8aebd-c8aec5 658->661 665 c8aecf-c8aed1 660->665 661->660 667 c8aede-c8aee3 665->667 668 c8aed3-c8aedb 665->668 669 c8af01-c8af0e 667->669 670 c8aee5-c8aeec 667->670 668->667 676 c8af10-c8af2e 669->676 677 c8af31-c8af37 669->677 670->669 672 c8aeee-c8aefe call c8a130 call c8a140 670->672 672->669 676->677 686->687 688 c8b02d-c8b033 687->688 689 c8b034-c8b048 687->689 688->689 691->649 692->649
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00C8B01E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 8e4e060b02e18797c485e2dd84a33a6abb759975ac11ce95d8e72e5cfdb60661
                                                                    • Instruction ID: 87b636326315f3ee96b5d853c79e95f4d7329354cea7dd998d10ea37a61a0211
                                                                    • Opcode Fuzzy Hash: 8e4e060b02e18797c485e2dd84a33a6abb759975ac11ce95d8e72e5cfdb60661
                                                                    • Instruction Fuzzy Hash: B2715970A00B058FE724EF69D04475ABBF1FF88308F108A2EE49AD7A50DB74E955CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 801 c8590c-c859d9 CreateActCtxA 803 c859db-c859e1 801->803 804 c859e2-c85a3c 801->804 803->804 811 c85a4b-c85a4f 804->811 812 c85a3e-c85a41 804->812 813 c85a60 811->813 814 c85a51-c85a5d 811->814 812->811 816 c85a61 813->816 814->813 816->816
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 00C859C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: 17c826bfb9633af4b1fabf6b34feffe211508a8f0382159d20e388b2eb247045
                                                                    • Instruction ID: 326da00d448de24c774087b2683cbdcd43631a3d594e6294223a419d8700a1f8
                                                                    • Opcode Fuzzy Hash: 17c826bfb9633af4b1fabf6b34feffe211508a8f0382159d20e388b2eb247045
                                                                    • Instruction Fuzzy Hash: C841D0B1C00719CBDB24DFA9C885BDEBBF5BF48714F20816AD409AB251DBB1A946CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 817 c844b4-c859d9 CreateActCtxA 820 c859db-c859e1 817->820 821 c859e2-c85a3c 817->821 820->821 828 c85a4b-c85a4f 821->828 829 c85a3e-c85a41 821->829 830 c85a60 828->830 831 c85a51-c85a5d 828->831 829->828 833 c85a61 830->833 831->830 833->833
                                                                    APIs
                                                                    • CreateActCtxA.KERNEL32(?), ref: 00C859C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: 7ebfefa1ac490e78c42cedce21b45a029c40a42d41af36d0d37cfb8d46dbb3d6
                                                                    • Instruction ID: eea4d33aadf0452c68daac0e385c52f37847256409d61a28f04047c94a7b77ed
                                                                    • Opcode Fuzzy Hash: 7ebfefa1ac490e78c42cedce21b45a029c40a42d41af36d0d37cfb8d46dbb3d6
                                                                    • Instruction Fuzzy Hash: 3041D2B0C0071DCBDB24DFA9C884A9EBBF5BF48704F20816AD409AB251DBB56946CF90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 834 7335551-73355a6 837 73355b6-73355f5 WriteProcessMemory 834->837 838 73355a8-73355b4 834->838 840 73355f7-73355fd 837->840 841 73355fe-733562e 837->841 838->837 840->841
                                                                    APIs
                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073355E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: fb5a92025604c2f2ab826a19b5bb5447dec5c3d6c5323afdcb61640a0ac23c7e
                                                                    • Instruction ID: b289f80162ddbcd08f4dcab151414b6640825963453259f459888cc28fb60bad
                                                                    • Opcode Fuzzy Hash: fb5a92025604c2f2ab826a19b5bb5447dec5c3d6c5323afdcb61640a0ac23c7e
                                                                    • Instruction Fuzzy Hash: 2A215CB59003099FDB10DFA9C845BDEBBF5FF48310F10842AE519A7340CB749555CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 845 7335641-7335645 846 7335646-733569f 845->846 847 733563b-733563f 845->847 849 73356a6-73356d5 ReadProcessMemory 846->849 847->845 850 73356d7-73356dd 849->850 851 73356de-733570e 849->851 850->851
                                                                    APIs
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073356C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessRead
                                                                    • String ID:
                                                                    • API String ID: 1726664587-0
                                                                    • Opcode ID: aeb15923e2af087b876d9dfaafe395378a875712d4c6c122d420178cfca78b96
                                                                    • Instruction ID: 842cc200b338c05e4b5b225697fceec3c208cf81d0382989ccb250f48439ec4e
                                                                    • Opcode Fuzzy Hash: aeb15923e2af087b876d9dfaafe395378a875712d4c6c122d420178cfca78b96
                                                                    • Instruction Fuzzy Hash: A82157B18003599FDB10DFAAC844AEEBBF5FF48310F14882EE558A7251C7789915DBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 855 7335558-73355a6 857 73355b6-73355f5 WriteProcessMemory 855->857 858 73355a8-73355b4 855->858 860 73355f7-73355fd 857->860 861 73355fe-733562e 857->861 858->857 860->861
                                                                    APIs
                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073355E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessWrite
                                                                    • String ID:
                                                                    • API String ID: 3559483778-0
                                                                    • Opcode ID: 3c2e99d1c2514dc1450ba4a836eeeec8bbd4d38b87e76ab55da0b80e7feae5fe
                                                                    • Instruction ID: abf1d5c91925665183393b5bfb057cf5faf774aa72e6a5c2d95dadc73705042f
                                                                    • Opcode Fuzzy Hash: 3c2e99d1c2514dc1450ba4a836eeeec8bbd4d38b87e76ab55da0b80e7feae5fe
                                                                    • Instruction Fuzzy Hash: 792139B19003099FDB10DFAAC885BDEBBF5FF48310F10842AE919A7340C778A955CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 865 73353b9-733540b 868 733541b-733544b Wow64SetThreadContext 865->868 869 733540d-7335419 865->869 871 7335454-7335484 868->871 872 733544d-7335453 868->872 869->868 872->871
                                                                    APIs
                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0733543E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: ContextThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 983334009-0
                                                                    • Opcode ID: efdb1d1026850db8c1746edfa519948d87ee543a6107a7f8423025917795260b
                                                                    • Instruction ID: a04cb5655d9a24e7beafe09fdfabfa4720454363d0b76079a8575767842d94f9
                                                                    • Opcode Fuzzy Hash: efdb1d1026850db8c1746edfa519948d87ee543a6107a7f8423025917795260b
                                                                    • Instruction Fuzzy Hash: E02159B19003099FDB14DFAAC485BEEBBF4EF48325F14842AD419A7241CB789945CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C8D737
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: ebe30c3ecdac4176f6a6d85d720e8ab0816ff56ffb27cf267878018915e0957c
                                                                    • Instruction ID: 1213af6ee8f3a8dcab61cde63476fef6b6889689385685ef69b41966d6caca9e
                                                                    • Opcode Fuzzy Hash: ebe30c3ecdac4176f6a6d85d720e8ab0816ff56ffb27cf267878018915e0957c
                                                                    • Instruction Fuzzy Hash: 682100B59002489FDB10CFAAD884AEEBFF5EB48320F24841AE958A3351C374A945CF60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073356C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MemoryProcessRead
                                                                    • String ID:
                                                                    • API String ID: 1726664587-0
                                                                    • Opcode ID: ada2c59e8e0087cf257180ac1da16b0fbfee4ea2b8176e6b8964c0b83b0248c8
                                                                    • Instruction ID: 8de1a2fe33840a7d904091e093f9166ef8fb422df8c8e3e0fb891972cf816294
                                                                    • Opcode Fuzzy Hash: ada2c59e8e0087cf257180ac1da16b0fbfee4ea2b8176e6b8964c0b83b0248c8
                                                                    • Instruction Fuzzy Hash: 122139B18003499FDB10DFAAC845AEEFBF5FF48310F50882AE519A7250C7749955DBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0733543E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: ContextThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 983334009-0
                                                                    • Opcode ID: 322b51c22fb48e90592a2d5055452532e981def9758458e55e4ce2d31d795fb4
                                                                    • Instruction ID: f29e2caf9c4cab600bf465dbe7f1ceca0985bb787c0031eb821e0740e488ab4b
                                                                    • Opcode Fuzzy Hash: 322b51c22fb48e90592a2d5055452532e981def9758458e55e4ce2d31d795fb4
                                                                    • Instruction Fuzzy Hash: 162149B19003098FDB14DFAAC4857EEFBF4EF88325F14842AD519A7241CB789945CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C8D737
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: DuplicateHandle
                                                                    • String ID:
                                                                    • API String ID: 3793708945-0
                                                                    • Opcode ID: c470e729651d83ed97ead278bc3660cc266b75b989e5e90b838930f3e9dc3f1a
                                                                    • Instruction ID: 5e354d3399ccf0adf7c0d57bade844c59cb6fb82746ca64dc7e1877db8b95dd3
                                                                    • Opcode Fuzzy Hash: c470e729651d83ed97ead278bc3660cc266b75b989e5e90b838930f3e9dc3f1a
                                                                    • Instruction Fuzzy Hash: FC21E2B5900248DFDB10DFAAD884ADEFBF9EB48320F14841AE918A3350C374A944CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: ResumeThread
                                                                    • String ID:
                                                                    • API String ID: 947044025-0
                                                                    • Opcode ID: 64ec76145b1f9687cbd0337789a210e5ec0c9e64c3993be83a5128f67b224b14
                                                                    • Instruction ID: 48fb8680747779fb1426df36481937b2140578f5e9ea78206005db96f89aec8b
                                                                    • Opcode Fuzzy Hash: 64ec76145b1f9687cbd0337789a210e5ec0c9e64c3993be83a5128f67b224b14
                                                                    • Instruction Fuzzy Hash: D611ACB08043488FDB20DFAAD8457DEFFF5EF89320F14845AD059A7251CA796944CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07335506
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 6ab8ed4996ec7f33cd9b0b0bbb68ad81f5b47c2afcc8012184750921817cc73f
                                                                    • Instruction ID: 1690fe9eeed4b083a78d9090dd15d7bbe202dfa1da91b068c9c79d5af1f1532e
                                                                    • Opcode Fuzzy Hash: 6ab8ed4996ec7f33cd9b0b0bbb68ad81f5b47c2afcc8012184750921817cc73f
                                                                    • Instruction Fuzzy Hash: 7F116AB68002499FDB10DFAAC845ADFFFF5EF88320F10881AE519A7250CB75A550CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C8B099,00000800,00000000,00000000), ref: 00C8B2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 3d2ed7d81eee77d4be0ade150a05e2b7eff3192307978efc14b15913ddb577dc
                                                                    • Instruction ID: 11bffc592a02193ce4c9d861efba2453a42db8f69c100c339319fb4a50717a78
                                                                    • Opcode Fuzzy Hash: 3d2ed7d81eee77d4be0ade150a05e2b7eff3192307978efc14b15913ddb577dc
                                                                    • Instruction Fuzzy Hash: 7D1126B6C003098FCB10DF9AD844ADEFBF4EB88324F10842EE529A7210C775A945CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07335506
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 74a765b5a40481da2670ecf9ec78856e831f9f4c2efcfc0efa8457ad012892e8
                                                                    • Instruction ID: 5596925c8ab8a2a097bec2496948c2e47c66e962560f557ed6116f242286d529
                                                                    • Opcode Fuzzy Hash: 74a765b5a40481da2670ecf9ec78856e831f9f4c2efcfc0efa8457ad012892e8
                                                                    • Instruction Fuzzy Hash: 611137B19002499FDB10DFAAC845ADFFFF5EF88320F14881AE519A7250CB75A954CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C8B099,00000800,00000000,00000000), ref: 00C8B2AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 7a2fd3d8d8deabf4f9933c0de92e9baa8c4b56eda06bd4326d42bbeaad2906d0
                                                                    • Instruction ID: 4603fbc3dd5df12b1a78cc87df3a57258d7d249fdb60fab92f90dd54f9c5673c
                                                                    • Opcode Fuzzy Hash: 7a2fd3d8d8deabf4f9933c0de92e9baa8c4b56eda06bd4326d42bbeaad2906d0
                                                                    • Instruction Fuzzy Hash: 6B1117B6C003098FDB10DFAAD444A9EFBF4EB48320F10851AD429A7250C374A945CFA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: ResumeThread
                                                                    • String ID:
                                                                    • API String ID: 947044025-0
                                                                    • Opcode ID: 37f7c29bc25b3e23b811f39223a65e53a4b49f354b9707b1c9e5ea0c2e5776c6
                                                                    • Instruction ID: c03b10d8f0cc8859d09d59700d769a2604b5b8dea9ea7f3f5801e7f5dbc3bef4
                                                                    • Opcode Fuzzy Hash: 37f7c29bc25b3e23b811f39223a65e53a4b49f354b9707b1c9e5ea0c2e5776c6
                                                                    • Instruction Fuzzy Hash: 09113AB1D003498FDB24DFAAC4457DEFBF5EB88324F24881AD519A7240CB79A945CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 07338915
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: 54fd84cecb9b28b7144874a94d6e03b4800ed955ed4c75189c9f70c81f13fe04
                                                                    • Instruction ID: 175cbc4ca9b6f9f623dc979caf0ebe771c6a491089445f1c3fd1d55818e05054
                                                                    • Opcode Fuzzy Hash: 54fd84cecb9b28b7144874a94d6e03b4800ed955ed4c75189c9f70c81f13fe04
                                                                    • Instruction Fuzzy Hash: 061106B5800349DFDB20DF9AD845BDEFBF8EB48310F10881AE518A7210C375A944CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 07338915
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755207603.0000000007330000.00000040.00000800.00020000.00000000.sdmp, Offset: 07330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_7330000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: ad666c6a423ac9ec2906f6f22b301930098c659ff8b32d7df7b5bda6768f7d07
                                                                    • Instruction ID: 1f2fadb389cd93e8358f63e509096db8da46958d1d8554264891911fb4bb55ab
                                                                    • Opcode Fuzzy Hash: ad666c6a423ac9ec2906f6f22b301930098c659ff8b32d7df7b5bda6768f7d07
                                                                    • Instruction Fuzzy Hash: C411F2B58003499FDB10DF9AD845BDEBBF8EB48320F10881AE518A7240C375A944CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00C8B01E
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1745145169.0000000000C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_c80000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID: HandleModule
                                                                    • String ID:
                                                                    • API String ID: 4139908857-0
                                                                    • Opcode ID: 61d7cde2ca5b3ca6732595ca786cf958ccfe751ad0b4fa9635e18d50c5bc2f46
                                                                    • Instruction ID: b84bd465ed23c758da4a5fa2fb2c46b74dd5a458448c164effa08e9aa33d1cf9
                                                                    • Opcode Fuzzy Hash: 61d7cde2ca5b3ca6732595ca786cf958ccfe751ad0b4fa9635e18d50c5bc2f46
                                                                    • Instruction Fuzzy Hash: B211DFB5C007498FCB14DF9AD844A9EFBF4AB88324F14841AD429A7210D375AA45CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: d6549b77766243a6f1dd9eba18f10c86cbc29dcfdaf96046df31a1b93ebda3eb
                                                                    • Instruction ID: 6a390b5ddbfefd99f7ab8412c3ca1e8115fce22d2bb216b165688f0a1ef5af2a
                                                                    • Opcode Fuzzy Hash: d6549b77766243a6f1dd9eba18f10c86cbc29dcfdaf96046df31a1b93ebda3eb
                                                                    • Instruction Fuzzy Hash: 2F519F71B002158FCB55DF7AD8849AEBBF6FFC4320B548969E429EB391EB309D058790
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: a7c7fafd46d6e8d396109273b9768d69f79e958ef709ccf331e8052c505b0a91
                                                                    • Instruction ID: d47da92c32c8fbbb5e9c1616c8b43262f3f23e7a6c0b933b4ba1f1e70aafc806
                                                                    • Opcode Fuzzy Hash: a7c7fafd46d6e8d396109273b9768d69f79e958ef709ccf331e8052c505b0a91
                                                                    • Instruction Fuzzy Hash: 53210BB1D042488BEB48DFEAD9556EEFFF6AF89300F10C02AD419AB354DB7019058B81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Te^q
                                                                    • API String ID: 0-671973202
                                                                    • Opcode ID: f6a7135206feb883fa06eab5de78d41f3a7deef60fdca894e26954d4bccd95c9
                                                                    • Instruction ID: 50cfdfc1ea948d3374f260c036c5b0c97e75d159b56584f39e4726616300494b
                                                                    • Opcode Fuzzy Hash: f6a7135206feb883fa06eab5de78d41f3a7deef60fdca894e26954d4bccd95c9
                                                                    • Instruction Fuzzy Hash: 23112131F0020A8BCB54EBBA99505EEBAF6AF84214F50447AD509E7384EB319D15C791
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 09b6b16ef25211bea19977bdd72ea008aec9f0416cdb7c6d4b35cc9a5c741809
                                                                    • Instruction ID: 124797595f69b424914abef62dd3221f21e66a2b33056f836031bf0730ad5cfe
                                                                    • Opcode Fuzzy Hash: 09b6b16ef25211bea19977bdd72ea008aec9f0416cdb7c6d4b35cc9a5c741809
                                                                    • Instruction Fuzzy Hash: F751E475E05219DFDB44CFAAC9809ADBBF1FB49310F10952AE89ABB310D731A941CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70f50540365b79e933e4badf51ff134d3998ad397715e2a8418bfea4daaca17b
                                                                    • Instruction ID: 828bd4dafcfb6eea8c6873bb5d4db00054a4fdb31f9c16850a9b5a74f4017e88
                                                                    • Opcode Fuzzy Hash: 70f50540365b79e933e4badf51ff134d3998ad397715e2a8418bfea4daaca17b
                                                                    • Instruction Fuzzy Hash: 16511270E052089FDB08DFA9E995AEEBBF6FB89301F509059F405B7394CB349941CB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a6a6d6b5ac9817964df6df2bb4ed3db5f82de48a1a3067702ce8ca4aa950299b
                                                                    • Instruction ID: 1dec13ea3a5754aa584a50ac9e0c7af7ecaf3ddb7fd5eb15e33fbac7aff5a1c1
                                                                    • Opcode Fuzzy Hash: a6a6d6b5ac9817964df6df2bb4ed3db5f82de48a1a3067702ce8ca4aa950299b
                                                                    • Instruction Fuzzy Hash: 0041D075E112189FDB00EFA8D484AEEBBB1FB4C320F509559E814B3395DB35A994CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2b9d48a73d1fb000088d1197111bf58e312615c31bb087ae8b171980929bd5eb
                                                                    • Instruction ID: ed8d9be46fc54461f6823efa6cc7b7a9bdb2bd06d097030028548c3deab8d2e3
                                                                    • Opcode Fuzzy Hash: 2b9d48a73d1fb000088d1197111bf58e312615c31bb087ae8b171980929bd5eb
                                                                    • Instruction Fuzzy Hash: C0315AB5900209AFCF50DFAAD844ADEBFF9EB48320F10842AE519E7351D775A950CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 76de4ced95c6a066480b5dd9ea7e115457f6a132e02b4971291c34b3b710849f
                                                                    • Instruction ID: 0a24c11640a8e7db4edb45824eb6a38ba13884abe3a8f2c7c7bdf9946fdc3e06
                                                                    • Opcode Fuzzy Hash: 76de4ced95c6a066480b5dd9ea7e115457f6a132e02b4971291c34b3b710849f
                                                                    • Instruction Fuzzy Hash: E7311AB4E10219AFCB05DF98D851AEEBBB1FF48301F108569E914B7395DB709A41CFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: be04323f3c5e9b950466924a47241ee1ce1bd7e4baa6eff056f74936249c5952
                                                                    • Instruction ID: 44907be17835e90c1b45c54508a3dce6c8ba73722a579dad10e3d62ae8ef370a
                                                                    • Opcode Fuzzy Hash: be04323f3c5e9b950466924a47241ee1ce1bd7e4baa6eff056f74936249c5952
                                                                    • Instruction Fuzzy Hash: 002124B9600200DFCB09DF04C9C0F26BBA5FB94324F20C6BCDA0A0B356C336E816C6A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: db2e12c016b5cd5ca90afdbed7ee235c43d7a281fb0f63c28c525fadf74eabca
                                                                    • Instruction ID: 3172f2e74b3627bc6eb7f4c0b75d3b93b81af61ff2e35d26a25d02160accc7f2
                                                                    • Opcode Fuzzy Hash: db2e12c016b5cd5ca90afdbed7ee235c43d7a281fb0f63c28c525fadf74eabca
                                                                    • Instruction Fuzzy Hash: 6321F479604240DFDB05DF14D9C0F26BFA5FBA4318F24C5BDD9090A256C336D816C6A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744952958.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bdd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 96aa53799ddea11cb14c1c412c219dec9edb42766be4d618a060d7e9aa50a832
                                                                    • Instruction ID: d1e5ff85643dbbc89a5fc2fd8131902ee8550411642083c0a0ef18c708810d9a
                                                                    • Opcode Fuzzy Hash: 96aa53799ddea11cb14c1c412c219dec9edb42766be4d618a060d7e9aa50a832
                                                                    • Instruction Fuzzy Hash: 9421D375604200DFCB14DF14D9D4B16FBA5EB94314F24C5AED88A4B396D336D807CA61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2c2cf15b883243031e132e877d45f44121e419f9eb488cdf9a6c7c110fbfe9e3
                                                                    • Instruction ID: 9bf59f9cca53306181683e5744d748b1023e844d6c8a6f25f4ac6af6ac1e1204
                                                                    • Opcode Fuzzy Hash: 2c2cf15b883243031e132e877d45f44121e419f9eb488cdf9a6c7c110fbfe9e3
                                                                    • Instruction Fuzzy Hash: 33310470A11508EFD744EF5AE695999BBF1FF8C300F6180D4E4489B3A9DB309E91DB00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d2903ca99044d4c132fe4ff4b6c3d322e266d4e4fa5c467a68f04f2f080c3650
                                                                    • Instruction ID: fd71d8a8d36a525e0a078bfbb1dbb72fb796ab928b6ea64351f4adef09c8d80a
                                                                    • Opcode Fuzzy Hash: d2903ca99044d4c132fe4ff4b6c3d322e266d4e4fa5c467a68f04f2f080c3650
                                                                    • Instruction Fuzzy Hash: A521E4B0C01318DFDB60DF9AC986B8EBFF5AB08314F64845AE404B7250C7B55845CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744952958.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bdd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ec7ba0bdce4541e11152a9f2d74affb0bf65a47e85cdc9681687362a27e6d615
                                                                    • Instruction ID: da9fd2391e6c7f18ead0dedf45df6419f0684c1ebdb786c667e6d48f86d75c16
                                                                    • Opcode Fuzzy Hash: ec7ba0bdce4541e11152a9f2d74affb0bf65a47e85cdc9681687362a27e6d615
                                                                    • Instruction Fuzzy Hash: 7C2192755093808FCB12CF24D9A4715FFB1EB85314F28C5DBD8898B697C33A980ACB62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction ID: afdf6f8e19b732cf7841b03233b77aa7e47d0ca03d592ec40ce2ce1138036b37
                                                                    • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction Fuzzy Hash: 6111D37A504280CFCB16CF14D9C4B16BFB2FBA4324F24C6ADD8490B656C336D85ACBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction ID: 422be2a494c4ddbd53f46e5ff1e9287fa7fe623bd8e0c39c64ffc5995d5f7ad1
                                                                    • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                    • Instruction Fuzzy Hash: 6111DF76504240DFCB06CF00D9C4B16BFB2FB94324F24C2ADD9090B256C33AE85ACBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 48f552739802b672ca0347dde2d163740b3355084e588c157d4f0123246fe6d2
                                                                    • Instruction ID: 90a5547fdc787141f09708be573fbb736213d06a9613c069d09d280ae053b8d2
                                                                    • Opcode Fuzzy Hash: 48f552739802b672ca0347dde2d163740b3355084e588c157d4f0123246fe6d2
                                                                    • Instruction Fuzzy Hash: 172100B5C003499FCB50DF9AD884ADEBFF4FB48320F50842AE919A7211C375A954CFA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4b3ab21e658e2308f7673fa66a42cebded7a467a1133de725079e8701887a870
                                                                    • Instruction ID: 1d2725c213c63d9cf2706a61940a43a1da2a0cd69bfe0a71a72803d70e5858ab
                                                                    • Opcode Fuzzy Hash: 4b3ab21e658e2308f7673fa66a42cebded7a467a1133de725079e8701887a870
                                                                    • Instruction Fuzzy Hash: 0711E374A16508EFDB40DF99E599999BFF0FB88310F5280D4F884A7395DB30AAA4CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 58d803425d762a8c3a58c2128230ceee64f690db071602ba02038d19877f94a9
                                                                    • Instruction ID: 6cd81af294f3753a5803943628dc8fdfca0f47ce4599a19daaa345f60a778649
                                                                    • Opcode Fuzzy Hash: 58d803425d762a8c3a58c2128230ceee64f690db071602ba02038d19877f94a9
                                                                    • Instruction Fuzzy Hash: DF01F2751083449AE7209A29CCC4F66BFD8DF50325F28C8AFED094B282C6789C40C6B1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e3782d73c2649a18df8de3e355495e79fcf8538d4a088291489689a8c6034552
                                                                    • Instruction ID: 17719612a96fd29573b709617ea78c9b5a308ec3d23a906cd1b330ea46efa036
                                                                    • Opcode Fuzzy Hash: e3782d73c2649a18df8de3e355495e79fcf8538d4a088291489689a8c6034552
                                                                    • Instruction Fuzzy Hash: 0201ED71D00208DFDB15CF5BC84979EBEF5FB48360F64C169E828AB2A0C7B58984CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1744892914.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_bcd000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a898b10223626e714d877c99419de7d7b888ee33adfb5f0a54beca56aacfce31
                                                                    • Instruction ID: a505f13c64a95b915b444bbef8f984ce84cb868b1f02f7791700c9c40e2c276c
                                                                    • Opcode Fuzzy Hash: a898b10223626e714d877c99419de7d7b888ee33adfb5f0a54beca56aacfce31
                                                                    • Instruction Fuzzy Hash: A2F0C276004344AEE7208A19CC84B62FFD8EB90334F18C46FED084B282C2789C44CA70
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 92df9f0567a801d6b744a0f7eceb0536c372568cefb9dbbb45dfbc29e5a536d1
                                                                    • Instruction ID: 0dcebfeaabcea5ec885e2e3eb3d6e57d88b192bb4287c46249f40635fb4f0773
                                                                    • Opcode Fuzzy Hash: 92df9f0567a801d6b744a0f7eceb0536c372568cefb9dbbb45dfbc29e5a536d1
                                                                    • Instruction Fuzzy Hash: 84E0E579909208EBCB04DF94D841AADBB75EB49320F14C19AFC1827290C6329A61EF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 91217f8f35512fc57a85c4a046ed2f6eeb2bdf6e3f412628246778d354d5d66a
                                                                    • Instruction ID: e40fddd8a19a1e281c34b0712b3a95d45cdcf63f44e9217ace61202a97ddfd36
                                                                    • Opcode Fuzzy Hash: 91217f8f35512fc57a85c4a046ed2f6eeb2bdf6e3f412628246778d354d5d66a
                                                                    • Instruction Fuzzy Hash: 89E0C27180A108EFC780FFB6C9116AE7BFDDF05204F0088A5B40993190EE315E04DBD2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7dea3902cf1bf8434d839b2a8fb2892d7d7679de78d102e1352727cf837e9199
                                                                    • Instruction ID: 823d6fc2e9ae9fce16eb5757980aae65c7658fbf40dd62a1539cf51a6a684100
                                                                    • Opcode Fuzzy Hash: 7dea3902cf1bf8434d839b2a8fb2892d7d7679de78d102e1352727cf837e9199
                                                                    • Instruction Fuzzy Hash: AAE04638909208FBCB44DF95D8419ACBF79EB49310F20C099FC0827391CA32AA56EB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 157854e35c07a97c6d2810d36610692d3f563272adae4ed358609127b08fa96d
                                                                    • Instruction ID: 1fefd303d5c5a93982333fd0f8bbbcda867a60278879864207f564ff8c517062
                                                                    • Opcode Fuzzy Hash: 157854e35c07a97c6d2810d36610692d3f563272adae4ed358609127b08fa96d
                                                                    • Instruction Fuzzy Hash: 57E01A3180520CFFCF05DFA4E90599D7F76FB09301F108198F90426260C7329AA0EF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 92797b362da45bab4d3a2a65f6a07d5db3a8d40b7ab5c7e89fe9129be7f6aad3
                                                                    • Instruction ID: 5f56896d7b1a45e0813d14464bf4e8924a73ddc2d355ab44f1dc2f319f13cda4
                                                                    • Opcode Fuzzy Hash: 92797b362da45bab4d3a2a65f6a07d5db3a8d40b7ab5c7e89fe9129be7f6aad3
                                                                    • Instruction Fuzzy Hash: A6E08C71809208EBCB80EFB5C9166AE7BFC9B09305F0044A5B80997190EE315A049B92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5abf8d90b8a95e0d8961f21674b48ab5c6b9dc8a297cac461e214970ab91ed52
                                                                    • Instruction ID: 555f7f1cd5c49719e509b107b25abea9ba30eb2008014287f09a1b7e01b19897
                                                                    • Opcode Fuzzy Hash: 5abf8d90b8a95e0d8961f21674b48ab5c6b9dc8a297cac461e214970ab91ed52
                                                                    • Instruction Fuzzy Hash: 66E08634A09108EFC704DF94D4419ACBF79EB45310F10C0ADEC0417340D6326E51DB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ef2d9f25e213916566500d0fea66f97baabcbbc5857013143bcbb5f256db03b5
                                                                    • Instruction ID: 580f536543274bdea7cefcd859f3159343fb156fd9de944d735f0d5bc35fcf13
                                                                    • Opcode Fuzzy Hash: ef2d9f25e213916566500d0fea66f97baabcbbc5857013143bcbb5f256db03b5
                                                                    • Instruction Fuzzy Hash: 1BE0C274D09108EBCB04DF94D8415ACBBB9EB45300F10C0ACE81817390CA316E42DB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3f19ed77a26f0c0892c71fc0de7d23e7e3a606ab9892cfcbdf28ce9a4d6adedb
                                                                    • Instruction ID: 22e89d8412307d946259d1f16883ed5e3293316d7a0ec929ab6d61a0ebda900d
                                                                    • Opcode Fuzzy Hash: 3f19ed77a26f0c0892c71fc0de7d23e7e3a606ab9892cfcbdf28ce9a4d6adedb
                                                                    • Instruction Fuzzy Hash: DFD0A77144E10CEBE340D769DA16FFD77BC9741314F005154F409531918A711D10D195
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000008.00000002.1755142814.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_8_2_6f60000_KGuxmqSTXgJca.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dd9715a7785570c07e3edf0739ba9729f646ff3f9a6c6afbc1f03d9073c34e9e
                                                                    • Instruction ID: 4b436514c995b480cbc9caa9a8be1322f46dda7753473620e77f0c1694e37d28
                                                                    • Opcode Fuzzy Hash: dd9715a7785570c07e3edf0739ba9729f646ff3f9a6c6afbc1f03d9073c34e9e
                                                                    • Instruction Fuzzy Hash: A8C08C3505870887E3043B98F42E3643FB8E702712F400014F10881490CE6094C0C696
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:1.1%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:4.3%
                                                                    Total number of Nodes:506
                                                                    Total number of Limit Nodes:12
                                                                    execution_graph 46504 434887 46505 434893 ___DestructExceptionObject 46504->46505 46530 434596 46505->46530 46507 43489a 46509 4348c3 46507->46509 46825 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46507->46825 46517 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46509->46517 46826 444251 5 API calls ___crtLCMapStringA 46509->46826 46511 4348dc 46513 4348e2 ___DestructExceptionObject 46511->46513 46827 4441f5 5 API calls ___crtLCMapStringA 46511->46827 46514 434962 46541 434b14 46514->46541 46517->46514 46828 4433e7 35 API calls 5 library calls 46517->46828 46525 43498e 46526 434997 46525->46526 46829 4433c2 28 API calls _abort 46525->46829 46830 43470d 13 API calls 2 library calls 46526->46830 46531 43459f 46530->46531 46831 434c52 IsProcessorFeaturePresent 46531->46831 46533 4345ab 46832 438f31 10 API calls 4 library calls 46533->46832 46535 4345b0 46540 4345b4 46535->46540 46833 4440bf 46535->46833 46538 4345cb 46538->46507 46540->46507 46849 436e90 46541->46849 46544 434968 46545 4441a2 46544->46545 46851 44f059 46545->46851 46547 434971 46550 40e9c5 46547->46550 46548 4441ab 46548->46547 46855 446815 35 API calls 46548->46855 46857 41cb50 LoadLibraryA GetProcAddress 46550->46857 46552 40e9e1 GetModuleFileNameW 46862 40f3c3 46552->46862 46554 40e9fd 46877 4020f6 46554->46877 46557 4020f6 28 API calls 46558 40ea1b 46557->46558 46883 41be1b 46558->46883 46562 40ea2d 46909 401e8d 46562->46909 46564 40ea36 46565 40ea93 46564->46565 46566 40ea49 46564->46566 46915 401e65 22 API calls 46565->46915 46939 40fbb3 95 API calls 46566->46939 46569 40eaa3 46916 401e65 22 API calls 46569->46916 46570 40ea5b 46940 401e65 22 API calls 46570->46940 46572 40ea67 46941 410f37 36 API calls __EH_prolog 46572->46941 46574 40eac2 46917 40531e 28 API calls 46574->46917 46577 40ead1 46918 406383 28 API calls 46577->46918 46578 40ea79 46942 40fb64 77 API calls 46578->46942 46581 40eadd 46919 401fe2 46581->46919 46582 40ea82 46943 40f3b0 70 API calls 46582->46943 46588 401fd8 11 API calls 46590 40eefb 46588->46590 46589 401fd8 11 API calls 46591 40eafb 46589->46591 46820 4432f6 GetModuleHandleW 46590->46820 46931 401e65 22 API calls 46591->46931 46593 40eb04 46932 401fc0 28 API calls 46593->46932 46595 40eb0f 46933 401e65 22 API calls 46595->46933 46597 40eb28 46934 401e65 22 API calls 46597->46934 46599 40eb43 46600 40ebae 46599->46600 46944 406c1e 28 API calls 46599->46944 46935 401e65 22 API calls 46600->46935 46603 40eb70 46604 401fe2 28 API calls 46603->46604 46605 40eb7c 46604->46605 46608 401fd8 11 API calls 46605->46608 46606 40ec02 46936 40d069 46606->46936 46607 40ebbb 46607->46606 46946 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 46607->46946 46610 40eb85 46608->46610 46945 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 46610->46945 46611 40ec08 46612 40ea8b 46611->46612 46948 41b2c3 33 API calls 46611->46948 46612->46588 46615 40eba4 46615->46600 46617 40f34f 46615->46617 47026 4139a9 30 API calls 46617->47026 46618 40ec23 46621 40ec76 46618->46621 46949 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 46618->46949 46619 40ebe6 46619->46606 46947 4139a9 30 API calls 46619->46947 46954 401e65 22 API calls 46621->46954 46625 40ec7f 46633 40ec90 46625->46633 46634 40ec8b 46625->46634 46626 40ec3e 46628 40ec42 46626->46628 46629 40ec4c 46626->46629 46627 40f365 47027 412475 65 API calls ___scrt_fastfail 46627->47027 46950 407738 30 API calls 46628->46950 46952 401e65 22 API calls 46629->46952 46956 401e65 22 API calls 46633->46956 46955 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46634->46955 46635 40ec47 46951 407260 97 API calls 46635->46951 46640 40f37f 47029 413a23 RegOpenKeyExW RegDeleteValueW 46640->47029 46641 40ec99 46957 41bc5e 28 API calls 46641->46957 46643 40ec55 46643->46621 46648 40ec71 46643->46648 46645 40eca4 46958 401f13 28 API calls 46645->46958 46646 40f392 47030 401f09 11 API calls 46646->47030 46953 407260 97 API calls 46648->46953 46651 40ecaf 46959 401f09 11 API calls 46651->46959 46652 40f39c 47031 401f09 11 API calls 46652->47031 46654 40ecb8 46960 401e65 22 API calls 46654->46960 46657 40f3a5 47032 40dd42 27 API calls 46657->47032 46658 40ecc1 46961 401e65 22 API calls 46658->46961 46660 40f3aa 47033 414f2a 167 API calls 46660->47033 46664 40ecdb 46962 401e65 22 API calls 46664->46962 46666 40ecf5 46963 401e65 22 API calls 46666->46963 46668 40ed80 46671 40ed8a 46668->46671 46676 40ef06 ___scrt_fastfail 46668->46676 46669 40ed0e 46669->46668 46964 401e65 22 API calls 46669->46964 46672 40ed93 46671->46672 46678 40ee0f 46671->46678 46970 401e65 22 API calls 46672->46970 46674 40ed9c 46971 401e65 22 API calls 46674->46971 46675 40ed23 _wcslen 46675->46668 46965 401e65 22 API calls 46675->46965 46981 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46676->46981 46702 40ee0a ___scrt_fastfail 46678->46702 46680 40edae 46972 401e65 22 API calls 46680->46972 46681 40ed3e 46966 401e65 22 API calls 46681->46966 46684 40edc0 46973 401e65 22 API calls 46684->46973 46686 40ed53 46967 40da34 31 API calls 46686->46967 46687 40ef51 46982 401e65 22 API calls 46687->46982 46691 40ede9 46974 401e65 22 API calls 46691->46974 46692 40ef76 46983 402093 28 API calls 46692->46983 46693 40ed66 46968 401f13 28 API calls 46693->46968 46695 40ed72 46969 401f09 11 API calls 46695->46969 46699 40edfa 46975 40cdf9 45 API calls _wcslen 46699->46975 46700 40ef88 46984 41376f 14 API calls 46700->46984 46701 40ed7b 46701->46668 46702->46678 46976 413947 31 API calls 46702->46976 46706 40ef9e 46985 401e65 22 API calls 46706->46985 46707 40eea3 ctype 46977 401e65 22 API calls 46707->46977 46709 40efaa 46986 43baac 39 API calls _swprintf 46709->46986 46712 40efb7 46715 40efe4 46712->46715 46987 41cd9b 86 API calls ___scrt_fastfail 46712->46987 46713 40eeba 46713->46687 46978 401e65 22 API calls 46713->46978 46988 402093 28 API calls 46715->46988 46716 40eed7 46979 41bc5e 28 API calls 46716->46979 46720 40efc8 CreateThread 46720->46715 47102 41d45d 10 API calls 46720->47102 46721 40eff9 46989 402093 28 API calls 46721->46989 46722 40eee3 46980 40f474 103 API calls 46722->46980 46725 40f008 46990 41b4ef 79 API calls 46725->46990 46726 40eee8 46726->46687 46728 40eeef 46726->46728 46728->46612 46729 40f00d 46991 401e65 22 API calls 46729->46991 46731 40f019 46992 401e65 22 API calls 46731->46992 46733 40f02b 46993 401e65 22 API calls 46733->46993 46735 40f04b 46994 43baac 39 API calls _swprintf 46735->46994 46737 40f058 46995 401e65 22 API calls 46737->46995 46739 40f063 46996 401e65 22 API calls 46739->46996 46741 40f074 46997 401e65 22 API calls 46741->46997 46743 40f089 46998 401e65 22 API calls 46743->46998 46745 40f09a 46746 40f0a1 StrToIntA 46745->46746 46999 409de4 169 API calls _wcslen 46746->46999 46748 40f0b3 47000 401e65 22 API calls 46748->47000 46750 40f101 47003 401e65 22 API calls 46750->47003 46751 40f0bc 46751->46750 47001 4344ea 22 API calls 3 library calls 46751->47001 46754 40f0d1 47002 401e65 22 API calls 46754->47002 46756 40f0e4 46757 40f0eb CreateThread 46756->46757 46757->46750 47104 419fb4 102 API calls __EH_prolog 46757->47104 46758 40f159 47006 401e65 22 API calls 46758->47006 46759 40f111 46759->46758 47004 4344ea 22 API calls 3 library calls 46759->47004 46762 40f126 47005 401e65 22 API calls 46762->47005 46764 40f138 46769 40f13f CreateThread 46764->46769 46765 40f1cc 47012 401e65 22 API calls 46765->47012 46766 40f162 46766->46765 47007 401e65 22 API calls 46766->47007 46769->46758 47103 419fb4 102 API calls __EH_prolog 46769->47103 46770 40f17e 47008 401e65 22 API calls 46770->47008 46771 40f1d5 46772 40f21a 46771->46772 47013 401e65 22 API calls 46771->47013 47017 41b60d 79 API calls 46772->47017 46776 40f193 47009 40d9e8 31 API calls 46776->47009 46777 40f223 47018 401f13 28 API calls 46777->47018 46778 40f1ea 47014 401e65 22 API calls 46778->47014 46780 40f22e 47019 401f09 11 API calls 46780->47019 46784 40f1a6 47010 401f13 28 API calls 46784->47010 46786 40f237 CreateThread 46791 40f264 46786->46791 46792 40f258 CreateThread 46786->46792 47105 40f7a7 120 API calls 46786->47105 46787 40f1ff 47015 43baac 39 API calls _swprintf 46787->47015 46788 40f1b2 47011 401f09 11 API calls 46788->47011 46793 40f279 46791->46793 46794 40f26d CreateThread 46791->46794 46792->46791 47106 4120f7 137 API calls 46792->47106 46798 40f2cc 46793->46798 47020 402093 28 API calls 46793->47020 46794->46793 47107 4126db 38 API calls ___scrt_fastfail 46794->47107 46796 40f1bb CreateThread 46796->46765 47108 401be9 49 API calls 46796->47108 46797 40f20c 47016 40c162 7 API calls 46797->47016 47022 4134ff RegOpenKeyExA RegQueryValueExA RegCloseKey 46798->47022 46801 40f29c 47021 4052fd 28 API calls 46801->47021 46804 40f2e4 46804->46657 47023 41bc5e 28 API calls 46804->47023 46809 40f2fd 47024 41361b 31 API calls 46809->47024 46814 40f313 47025 401f09 11 API calls 46814->47025 46816 40f346 DeleteFileW 46817 40f34d 46816->46817 46818 40f31e 46816->46818 47028 41bc5e 28 API calls 46817->47028 46818->46816 46818->46817 46819 40f334 Sleep 46818->46819 46819->46818 46821 434984 46820->46821 46821->46525 46822 44341f 46821->46822 47110 44319c 46822->47110 46825->46507 46826->46511 46827->46517 46828->46514 46829->46526 46830->46513 46831->46533 46832->46535 46837 44fb68 46833->46837 46836 438f5a 8 API calls 3 library calls 46836->46540 46840 44fb81 46837->46840 46839 4345bd 46839->46538 46839->46836 46841 434fcb 46840->46841 46842 434fd6 IsProcessorFeaturePresent 46841->46842 46843 434fd4 46841->46843 46845 435018 46842->46845 46843->46839 46848 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46845->46848 46847 4350fb 46847->46839 46848->46847 46850 434b27 GetStartupInfoW 46849->46850 46850->46544 46852 44f06b 46851->46852 46853 44f062 46851->46853 46852->46548 46856 44ef58 48 API calls 4 library calls 46853->46856 46855->46548 46856->46852 46858 41cb8f LoadLibraryA GetProcAddress 46857->46858 46859 41cb7f GetModuleHandleA GetProcAddress 46857->46859 46860 41cbb8 44 API calls 46858->46860 46861 41cba8 LoadLibraryA GetProcAddress 46858->46861 46859->46858 46860->46552 46861->46860 47034 41b4a8 FindResourceA 46862->47034 46866 40f3ed _Yarn 47044 4020b7 46866->47044 46869 401fe2 28 API calls 46870 40f413 46869->46870 46871 401fd8 11 API calls 46870->46871 46872 40f41c 46871->46872 46873 43bd51 _Yarn 21 API calls 46872->46873 46874 40f42d _Yarn 46873->46874 47050 406dd8 46874->47050 46876 40f460 46876->46554 46878 40210c 46877->46878 46879 4023ce 11 API calls 46878->46879 46880 402126 46879->46880 46881 402569 28 API calls 46880->46881 46882 402134 46881->46882 46882->46557 47087 4020df 46883->47087 46885 401fd8 11 API calls 46886 41bed0 46885->46886 46887 401fd8 11 API calls 46886->46887 46889 41bed8 46887->46889 46888 41bea0 47093 4041a2 28 API calls 46888->47093 46892 401fd8 11 API calls 46889->46892 46894 40ea24 46892->46894 46893 41beac 46895 401fe2 28 API calls 46893->46895 46905 40fb17 46894->46905 46897 41beb5 46895->46897 46896 401fe2 28 API calls 46901 41be2e 46896->46901 46898 401fd8 11 API calls 46897->46898 46900 41bebd 46898->46900 46899 401fd8 11 API calls 46899->46901 47094 41ce34 28 API calls 46900->47094 46901->46888 46901->46896 46901->46899 46904 41be9e 46901->46904 47091 4041a2 28 API calls 46901->47091 47092 41ce34 28 API calls 46901->47092 46904->46885 46906 40fb23 46905->46906 46908 40fb2a 46905->46908 47095 402163 11 API calls 46906->47095 46908->46562 46910 402163 46909->46910 46911 40219f 46910->46911 47096 402730 11 API calls 46910->47096 46911->46564 46913 402184 47097 402712 11 API calls std::_Deallocate 46913->47097 46915->46569 46916->46574 46917->46577 46918->46581 46920 401ff1 46919->46920 46921 402039 46919->46921 46922 4023ce 11 API calls 46920->46922 46928 401fd8 46921->46928 46923 401ffa 46922->46923 46924 40203c 46923->46924 46925 402015 46923->46925 47099 40267a 11 API calls 46924->47099 47098 403098 28 API calls 46925->47098 46929 4023ce 11 API calls 46928->46929 46930 401fe1 46929->46930 46930->46589 46931->46593 46932->46595 46933->46597 46934->46599 46935->46607 47100 401fab 46936->47100 46938 40d073 CreateMutexA GetLastError 46938->46611 46939->46570 46940->46572 46941->46578 46942->46582 46944->46603 46945->46615 46946->46619 46947->46606 46948->46618 46949->46626 46950->46635 46951->46629 46952->46643 46953->46621 46954->46625 46955->46633 46956->46641 46957->46645 46958->46651 46959->46654 46960->46658 46961->46664 46962->46666 46963->46669 46964->46675 46965->46681 46966->46686 46967->46693 46968->46695 46969->46701 46970->46674 46971->46680 46972->46684 46973->46691 46974->46699 46975->46702 46976->46707 46977->46713 46978->46716 46979->46722 46980->46726 46981->46687 46982->46692 46983->46700 46984->46706 46985->46709 46986->46712 46987->46720 46988->46721 46989->46725 46990->46729 46991->46731 46992->46733 46993->46735 46994->46737 46995->46739 46996->46741 46997->46743 46998->46745 46999->46748 47000->46751 47001->46754 47002->46756 47003->46759 47004->46762 47005->46764 47006->46766 47007->46770 47008->46776 47009->46784 47010->46788 47011->46796 47012->46771 47013->46778 47014->46787 47015->46797 47016->46772 47017->46777 47018->46780 47019->46786 47020->46801 47022->46804 47023->46809 47024->46814 47025->46818 47026->46627 47028->46640 47029->46646 47030->46652 47031->46657 47032->46660 47101 41ad17 104 API calls 47033->47101 47035 41b4c5 LoadResource LockResource SizeofResource 47034->47035 47036 40f3de 47034->47036 47035->47036 47037 43bd51 47036->47037 47042 446137 __Getctype 47037->47042 47038 446175 47054 4405dd 20 API calls __dosmaperr 47038->47054 47039 446160 RtlAllocateHeap 47041 446173 47039->47041 47039->47042 47041->46866 47042->47038 47042->47039 47053 442f80 7 API calls 2 library calls 47042->47053 47045 4020bf 47044->47045 47055 4023ce 47045->47055 47047 4020ca 47059 40250a 47047->47059 47049 4020d9 47049->46869 47051 4020b7 28 API calls 47050->47051 47052 406dec 47051->47052 47052->46876 47053->47042 47054->47041 47056 402428 47055->47056 47057 4023d8 47055->47057 47056->47047 47057->47056 47066 4027a7 11 API calls std::_Deallocate 47057->47066 47060 40251a 47059->47060 47061 402520 47060->47061 47062 402535 47060->47062 47067 402569 47061->47067 47077 4028e8 28 API calls 47062->47077 47065 402533 47065->47049 47066->47056 47078 402888 47067->47078 47069 40257d 47070 402592 47069->47070 47071 4025a7 47069->47071 47083 402a34 22 API calls 47070->47083 47085 4028e8 28 API calls 47071->47085 47074 40259b 47084 4029da 22 API calls 47074->47084 47076 4025a5 47076->47065 47077->47065 47079 402890 47078->47079 47080 402898 47079->47080 47086 402ca3 22 API calls 47079->47086 47080->47069 47083->47074 47084->47076 47085->47076 47088 4020e7 47087->47088 47089 4023ce 11 API calls 47088->47089 47090 4020f2 47089->47090 47090->46901 47091->46901 47092->46901 47093->46893 47094->46904 47095->46908 47096->46913 47097->46911 47098->46921 47099->46921 47109 4127ee 61 API calls 47106->47109 47111 4431a8 _abort 47110->47111 47112 4431c0 47111->47112 47114 4432f6 _abort GetModuleHandleW 47111->47114 47132 445888 EnterCriticalSection 47112->47132 47115 4431b4 47114->47115 47115->47112 47144 44333a GetModuleHandleExW 47115->47144 47118 4431c8 47120 44323d 47118->47120 47130 443266 47118->47130 47152 443f50 20 API calls _abort 47118->47152 47129 443255 47120->47129 47153 4441f5 5 API calls ___crtLCMapStringA 47120->47153 47121 443283 47136 4432b5 47121->47136 47122 4432af 47155 457729 5 API calls ___crtLCMapStringA 47122->47155 47154 4441f5 5 API calls ___crtLCMapStringA 47129->47154 47133 4432a6 47130->47133 47132->47118 47156 4458d0 LeaveCriticalSection 47133->47156 47135 44327f 47135->47121 47135->47122 47157 448cc9 47136->47157 47139 4432e3 47141 44333a _abort 8 API calls 47139->47141 47140 4432c3 GetPEB 47140->47139 47142 4432d3 GetCurrentProcess TerminateProcess 47140->47142 47143 4432eb ExitProcess 47141->47143 47142->47139 47145 443364 GetProcAddress 47144->47145 47146 443387 47144->47146 47147 443379 47145->47147 47148 443396 47146->47148 47149 44338d FreeLibrary 47146->47149 47147->47146 47150 434fcb ___crtLCMapStringA 5 API calls 47148->47150 47149->47148 47151 4433a0 47150->47151 47151->47112 47152->47120 47153->47129 47154->47130 47156->47135 47158 448cee 47157->47158 47162 448ce4 47157->47162 47163 4484ca 47158->47163 47160 434fcb ___crtLCMapStringA 5 API calls 47161 4432bf 47160->47161 47161->47139 47161->47140 47162->47160 47164 4484fa 47163->47164 47167 4484f6 47163->47167 47164->47162 47165 44851a 47165->47164 47168 448526 GetProcAddress 47165->47168 47167->47164 47167->47165 47170 448566 47167->47170 47169 448536 __crt_fast_encode_pointer 47168->47169 47169->47164 47171 448587 LoadLibraryExW 47170->47171 47172 44857c 47170->47172 47173 4485a4 GetLastError 47171->47173 47176 4485bc 47171->47176 47172->47167 47174 4485af LoadLibraryExW 47173->47174 47173->47176 47174->47176 47175 4485d3 FreeLibrary 47175->47172 47176->47172 47176->47175 47177 404e26 WaitForSingleObject 47178 404e40 SetEvent FindCloseChangeNotification 47177->47178 47179 404e57 closesocket 47177->47179 47180 404ed8 47178->47180 47181 404e64 47179->47181 47182 404e7a 47181->47182 47190 4050e4 83 API calls 47181->47190 47184 404e8c WaitForSingleObject 47182->47184 47185 404ece SetEvent CloseHandle 47182->47185 47191 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47184->47191 47185->47180 47187 404e9b SetEvent WaitForSingleObject 47192 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47187->47192 47189 404eb3 SetEvent CloseHandle CloseHandle 47189->47185 47190->47182 47191->47187 47192->47189 47193 448299 GetLastError 47194 4482b2 47193->47194 47195 4482b8 47193->47195 47219 4487bc 11 API calls 2 library calls 47194->47219 47199 44830f SetLastError 47195->47199 47212 445af3 47195->47212 47202 448318 47199->47202 47200 4482d2 47220 446782 20 API calls _free 47200->47220 47203 4482e7 47203->47200 47205 4482ee 47203->47205 47222 448087 20 API calls __Toupper 47205->47222 47206 4482d8 47208 448306 SetLastError 47206->47208 47208->47202 47209 4482f9 47223 446782 20 API calls _free 47209->47223 47211 4482ff 47211->47199 47211->47208 47217 445b00 __Getctype 47212->47217 47213 445b40 47225 4405dd 20 API calls __dosmaperr 47213->47225 47214 445b2b RtlAllocateHeap 47215 445b3e 47214->47215 47214->47217 47215->47200 47221 448812 11 API calls 2 library calls 47215->47221 47217->47213 47217->47214 47224 442f80 7 API calls 2 library calls 47217->47224 47219->47195 47220->47206 47221->47203 47222->47209 47223->47211 47224->47217 47225->47215

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                    • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                    • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProc$LibraryLoad$HandleModule
                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                    • API String ID: 4236061018-3687161714
                                                                    • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                    • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                    • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                    • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG,00446136,00000003), ref: 004432D6
                                                                    • TerminateProcess.KERNEL32(00000000), ref: 004432DD
                                                                    • ExitProcess.KERNEL32 ref: 004432EF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID: PkGNG
                                                                    • API String ID: 1703294689-263838557
                                                                    • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                    • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                    • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                    • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                    • SetEvent.KERNEL32(?), ref: 00404E43
                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                    • closesocket.WS2_32(?), ref: 00404E5A
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                                                    • SetEvent.KERNEL32(?), ref: 00404EA2
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                                                    • SetEvent.KERNEL32(?), ref: 00404EBA
                                                                    • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                    • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                    • SetEvent.KERNEL32(?), ref: 00404ED1
                                                                    • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                                                    • String ID: PkGNG
                                                                    • API String ID: 2403171778-263838557
                                                                    • Opcode ID: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                    • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                    • Opcode Fuzzy Hash: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                                                    • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044829E
                                                                    • _free.LIBCMT ref: 004482D3
                                                                    • _free.LIBCMT ref: 004482FA
                                                                    • SetLastError.KERNEL32(00000000), ref: 00448307
                                                                    • SetLastError.KERNEL32(00000000), ref: 00448310
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                    • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                    • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                    • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 53 448566-44857a 54 448587-4485a2 LoadLibraryExW 53->54 55 44857c-448585 53->55 57 4485a4-4485ad GetLastError 54->57 58 4485cb-4485d1 54->58 56 4485de-4485e0 55->56 59 4485bc 57->59 60 4485af-4485ba LoadLibraryExW 57->60 61 4485d3-4485d4 FreeLibrary 58->61 62 4485da 58->62 63 4485be-4485c0 59->63 60->63 61->62 64 4485dc-4485dd 62->64 63->58 65 4485c2-4485c9 63->65 64->56 65->64
                                                                    APIs
                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                    • GetLastError.KERNEL32(?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                    • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                    • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                    • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 66 40d069-40d095 call 401fab CreateMutexA GetLastError
                                                                    APIs
                                                                    • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                    • GetLastError.KERNEL32 ref: 0040D083
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateErrorLastMutex
                                                                    • String ID: SG
                                                                    • API String ID: 1925916568-3189917014
                                                                    • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                    • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                    • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                    • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 69 4484ca-4484f4 70 4484f6-4484f8 69->70 71 44855f 69->71 72 4484fe-448504 70->72 73 4484fa-4484fc 70->73 74 448561-448565 71->74 75 448506-448508 call 448566 72->75 76 448520 72->76 73->74 79 44850d-448510 75->79 78 448522-448524 76->78 80 448526-448534 GetProcAddress 78->80 81 44854f-44855d 78->81 82 448541-448547 79->82 83 448512-448518 79->83 84 448536-44853f call 43436e 80->84 85 448549 80->85 81->71 82->78 83->75 86 44851a 83->86 84->73 85->81 86->76
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
                                                                    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressProc__crt_fast_encode_pointer
                                                                    • String ID:
                                                                    • API String ID: 2279764990-0
                                                                    • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                    • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                                    • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                                    • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 103 445af3-445afe 104 445b00-445b0a 103->104 105 445b0c-445b12 103->105 104->105 106 445b40-445b4b call 4405dd 104->106 107 445b14-445b15 105->107 108 445b2b-445b3c RtlAllocateHeap 105->108 112 445b4d-445b4f 106->112 107->108 109 445b17-445b1e call 445545 108->109 110 445b3e 108->110 109->106 116 445b20-445b29 call 442f80 109->116 110->112 116->106 116->108
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000), ref: 00445B34
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                    • Instruction ID: e1e4bc9e3ed5bc60ab2f969cc6486aa84e060793a1580145f61584a75d3ee698
                                                                    • Opcode Fuzzy Hash: c045d3e2a3584f06f9c551ababd1bb43ae743c3abb802e5b049e03d8e1594b29
                                                                    • Instruction Fuzzy Hash: 9DF09031600D6967BF316A229C06B5BB749EB42760B548027BD08AA297CA38F80186BC
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 119 446137-446143 120 446175-446180 call 4405dd 119->120 121 446145-446147 119->121 128 446182-446184 120->128 122 446160-446171 RtlAllocateHeap 121->122 123 446149-44614a 121->123 126 446173 122->126 127 44614c-446153 call 445545 122->127 123->122 126->128 127->120 131 446155-44615e call 442f80 127->131 131->120 131->122
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                    • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                    • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                    • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                      • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                                                      • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                                                      • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                    • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                      • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                      • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                      • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                      • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                    • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                                                      • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                    • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                    • API String ID: 1067849700-181434739
                                                                    • Opcode ID: 3550356753090ff8d2e7e1df532b22bc2240acea58abd593ad1f807a75680658
                                                                    • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                    • Opcode Fuzzy Hash: 3550356753090ff8d2e7e1df532b22bc2240acea58abd593ad1f807a75680658
                                                                    • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • __Init_thread_footer.LIBCMT ref: 00405723
                                                                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                    • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                    • CloseHandle.KERNEL32 ref: 00405A23
                                                                    • CloseHandle.KERNEL32 ref: 00405A2B
                                                                    • CloseHandle.KERNEL32 ref: 00405A3D
                                                                    • CloseHandle.KERNEL32 ref: 00405A45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                    • API String ID: 2994406822-18413064
                                                                    • Opcode ID: da1bdc8411f8e038db4cd2d7e88b66755248fa7fef226cae948f8866e4122cee
                                                                    • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                    • Opcode Fuzzy Hash: da1bdc8411f8e038db4cd2d7e88b66755248fa7fef226cae948f8866e4122cee
                                                                    • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                      • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                    • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                    • API String ID: 3018269243-13974260
                                                                    • Opcode ID: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                    • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                    • Opcode Fuzzy Hash: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                                                    • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                    • API String ID: 1164774033-3681987949
                                                                    • Opcode ID: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                    • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                    • Opcode Fuzzy Hash: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                    • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenClipboard.USER32 ref: 004168C2
                                                                    • EmptyClipboard.USER32 ref: 004168D0
                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                    • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                    • CloseClipboard.USER32 ref: 00416955
                                                                    • OpenClipboard.USER32 ref: 0041695C
                                                                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                    • CloseClipboard.USER32 ref: 00416984
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                    • String ID: !D@
                                                                    • API String ID: 3520204547-604454484
                                                                    • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                    • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                    • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                    • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                    • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$Close$File$FirstNext
                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                    • API String ID: 3527384056-432212279
                                                                    • Opcode ID: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                                                    • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                    • Opcode Fuzzy Hash: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                                                    • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                    • API String ID: 3756808967-1743721670
                                                                    • Opcode ID: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                    • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                    • Opcode Fuzzy Hash: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                                                    • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0$1$2$3$4$5$6$7$VG
                                                                    • API String ID: 0-1861860590
                                                                    • Opcode ID: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                    • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                    • Opcode Fuzzy Hash: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                                                    • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 00407521
                                                                    • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Object_wcslen
                                                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                    • API String ID: 240030777-3166923314
                                                                    • Opcode ID: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                    • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                    • Opcode Fuzzy Hash: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                                                    • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                    • GetLastError.KERNEL32 ref: 0041A7BB
                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                    • String ID:
                                                                    • API String ID: 3587775597-0
                                                                    • Opcode ID: ed14f39142b7dc807e6e03d385886ca39e93324b35c447149c6a94c081aeaa6a
                                                                    • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                    • Opcode Fuzzy Hash: ed14f39142b7dc807e6e03d385886ca39e93324b35c447149c6a94c081aeaa6a
                                                                    • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                    • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                    • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                    • API String ID: 1164774033-405221262
                                                                    • Opcode ID: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                    • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                    • Opcode Fuzzy Hash: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                                                    • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C38E
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C39B
                                                                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C3BC
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3E2
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                    • String ID:
                                                                    • API String ID: 2341273852-0
                                                                    • Opcode ID: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                    • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                    • Opcode Fuzzy Hash: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                                                    • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Find$CreateFirstNext
                                                                    • String ID: 8SG$PXG$PXG$NG$PG
                                                                    • API String ID: 341183262-3812160132
                                                                    • Opcode ID: bbe42075c7ae05260fcfbdefb5d4915f8db24fce95c41e285dba89f894bfd920
                                                                    • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                    • Opcode Fuzzy Hash: bbe42075c7ae05260fcfbdefb5d4915f8db24fce95c41e285dba89f894bfd920
                                                                    • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                    • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                    • GetLastError.KERNEL32 ref: 0040A2ED
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                    • TranslateMessage.USER32(?), ref: 0040A34A
                                                                    • DispatchMessageA.USER32(?), ref: 0040A355
                                                                    Strings
                                                                    • Keylogger initialization failure: error , xrefs: 0040A301
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                    • String ID: Keylogger initialization failure: error
                                                                    • API String ID: 3219506041-952744263
                                                                    • Opcode ID: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                    • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                    • Opcode Fuzzy Hash: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                                                    • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 0040A416
                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                    • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                    • GetKeyState.USER32(00000010), ref: 0040A433
                                                                    • GetKeyboardState.USER32(?), ref: 0040A43E
                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                    • String ID:
                                                                    • API String ID: 1888522110-0
                                                                    • Opcode ID: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                    • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                    • Opcode Fuzzy Hash: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                                                    • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                    • API String ID: 2127411465-314212984
                                                                    • Opcode ID: b7359517016e2e52a7d8e2c138735bb23b4c70a2fa5bf599e9a0dfbaddd196e6
                                                                    • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                    • Opcode Fuzzy Hash: b7359517016e2e52a7d8e2c138735bb23b4c70a2fa5bf599e9a0dfbaddd196e6
                                                                    • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                      • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                      • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                      • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                      • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                    • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                    • API String ID: 1589313981-2876530381
                                                                    • Opcode ID: 7d52df1408e09a8eb3982e7da52f878f0a451a5f56a7a2098f3d013e22341463
                                                                    • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                    • Opcode Fuzzy Hash: 7d52df1408e09a8eb3982e7da52f878f0a451a5f56a7a2098f3d013e22341463
                                                                    • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                    Strings
                                                                    • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                    • String ID: http://geoplugin.net/json.gp
                                                                    • API String ID: 3121278467-91888290
                                                                    • Opcode ID: 585d05e2e02a37e8c452ed33f1419606295c771b0cc2953abdb39425aade45c9
                                                                    • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                    • Opcode Fuzzy Hash: 585d05e2e02a37e8c452ed33f1419606295c771b0cc2953abdb39425aade45c9
                                                                    • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                    • GetLastError.KERNEL32 ref: 0040BA58
                                                                    Strings
                                                                    • UserProfile, xrefs: 0040BA1E
                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                    • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                    • API String ID: 2018770650-1062637481
                                                                    • Opcode ID: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                                                    • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                    • Opcode Fuzzy Hash: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                                                    • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                    • GetLastError.KERNEL32 ref: 0041799D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                    • String ID: SeShutdownPrivilege
                                                                    • API String ID: 3534403312-3733053543
                                                                    • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                    • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                    • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                    • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00409258
                                                                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                    • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                                      • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                                                      • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                                                    • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                                                    • String ID:
                                                                    • API String ID: 2435342581-0
                                                                    • Opcode ID: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                    • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                    • Opcode Fuzzy Hash: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                                                    • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                    • String ID:
                                                                    • API String ID: 276877138-0
                                                                    • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                    • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                    • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                    • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 00413569
                                                                      • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 00413587
                                                                      • Part of subcall function 00413549: RegCloseKey.ADVAPI32(00000000), ref: 00413592
                                                                    • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                    • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                    • String ID: 4.9.4 Pro$override$pth_unenc
                                                                    • API String ID: 2281282204-930821335
                                                                    • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                    • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                    • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                    • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 004524D5
                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004524FE
                                                                    • GetACP.KERNEL32 ref: 00452513
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 2299586839-711371036
                                                                    • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                    • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                    • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                    • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                    • wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EventLocalTimewsprintf
                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                    • API String ID: 1497725170-248792730
                                                                    • Opcode ID: 874391c71ba160f51d9f8de8278d9470b21335720a9f8d42306f4a5fe414c82b
                                                                    • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                    • Opcode Fuzzy Hash: 874391c71ba160f51d9f8de8278d9470b21335720a9f8d42306f4a5fe414c82b
                                                                    • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                    • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                    • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                    • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                    • String ID: SETTINGS
                                                                    • API String ID: 3473537107-594951305
                                                                    • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                    • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                    • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                    • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 0040966A
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                    • String ID:
                                                                    • API String ID: 1157919129-0
                                                                    • Opcode ID: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                    • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                    • Opcode Fuzzy Hash: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                                                    • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                    • GetUserDefaultLCID.KERNEL32 ref: 0045271C
                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004527ED
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                    • String ID:
                                                                    • API String ID: 745075371-0
                                                                    • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                    • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                    • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                    • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00408811
                                                                    • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                    • String ID:
                                                                    • API String ID: 1771804793-0
                                                                    • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                    • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                    • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                    • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DownloadExecuteFileShell
                                                                    • String ID: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe$open
                                                                    • API String ID: 2825088817-4199108775
                                                                    • Opcode ID: 78e10e9a612b22b91ebf8b2931271f85cca1af5336b97d423d0fb1973267ad11
                                                                    • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                    • Opcode Fuzzy Hash: 78e10e9a612b22b91ebf8b2931271f85cca1af5336b97d423d0fb1973267ad11
                                                                    • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileFind$FirstNextsend
                                                                    • String ID: XPG$XPG
                                                                    • API String ID: 4113138495-1962359302
                                                                    • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                    • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                    • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                    • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                      • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                      • Part of subcall function 0041376F: RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                      • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                    • API String ID: 4127273184-3576401099
                                                                    • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                    • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                    • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                    • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00451DBA
                                                                    • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                                                    • _wcschr.LIBVCRUNTIME ref: 00451E58
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451EFB
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                    • String ID:
                                                                    • API String ID: 4212172061-0
                                                                    • Opcode ID: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                                                                    • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                    • Opcode Fuzzy Hash: d51387d99b1e6b249aff8f61d3989bee7608b3a62aead1fc41d833bb042b57a0
                                                                    • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 004493BD
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • GetTimeZoneInformation.KERNEL32 ref: 004493CF
                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 00449447
                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 00449474
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                    • String ID:
                                                                    • API String ID: 806657224-0
                                                                    • Opcode ID: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                                                                    • Instruction ID: 1863d2ad967fb4723a60e4ea427cb143a9fbff6035582c54e6546b9b7662ab80
                                                                    • Opcode Fuzzy Hash: 633092c3bba77b0065560d4fdbd9d9f897920caf7f9bf618c5d01735725c6ecb
                                                                    • Instruction Fuzzy Hash: E1312570908201EFDB18DF69DE8086EBBB8FF0572071442AFE054973A1D3748D42DB18
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PkGNG
                                                                    • API String ID: 0-263838557
                                                                    • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                    • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                    • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                    • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 2829624132-0
                                                                    • Opcode ID: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                                                                    • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                    • Opcode Fuzzy Hash: efce462eab54bf8eb2a2b6f9a4d43eb8e53eecd25de09d2246b00390d92e3d5e
                                                                    • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                    • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                    • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                    • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004334BF,00000034,?,?,00000000), ref: 00433849
                                                                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?), ref: 0043385F
                                                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?,0041E251), ref: 00433871
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                    • String ID:
                                                                    • API String ID: 1815803762-0
                                                                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                    • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                    • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                    • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                    • CloseClipboard.USER32 ref: 0040B725
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseDataOpen
                                                                    • String ID:
                                                                    • API String ID: 2058664381-0
                                                                    • Opcode ID: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                    • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                    • Opcode Fuzzy Hash: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                                                    • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID:
                                                                    • API String ID: 2325560087-3916222277
                                                                    • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                    • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                    • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                    • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: GetLocaleInfoEx
                                                                    • API String ID: 2299586839-2904428671
                                                                    • Opcode ID: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                    • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                    • Opcode Fuzzy Hash: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                                                    • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                                                                    • HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Heap$FreeProcess
                                                                    • String ID:
                                                                    • API String ID: 3859560861-0
                                                                    • Opcode ID: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                                                                    • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                                                                    • Opcode Fuzzy Hash: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                                                                    • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                    • String ID:
                                                                    • API String ID: 1663032902-0
                                                                    • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                    • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                    • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                    • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(004520C3,00000001), ref: 0045200D
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                                                                    • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                    • Opcode Fuzzy Hash: 92dc4731b164c5dad593997b290ced1c322b4c5a654dbafbc59ecf52729822b9
                                                                    • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                    • String ID:
                                                                    • API String ID: 2692324296-0
                                                                    • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                                    • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                    • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                                    • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(00452313,00000001), ref: 00452082
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                                                                    • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                    • Opcode Fuzzy Hash: 80e5df12ac25632c7280d140c15a53509e07ecbf1c9f73c72f1a6f69193256f5
                                                                    • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID:
                                                                    • API String ID: 2645101109-0
                                                                    • Opcode ID: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                    • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                    • Opcode Fuzzy Hash: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                                                    • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(?,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                    • EnumSystemLocalesW.KERNEL32(Function_000483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                    • String ID:
                                                                    • API String ID: 1272433827-0
                                                                    • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                    • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                    • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                    • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • EnumSystemLocalesW.KERNEL32(00451EA7,00000001), ref: 00451F87
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                    • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                    • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                    • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,4.9.4 Pro), ref: 0040F8E5
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 2299586839-0
                                                                    • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                    • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                    • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                    • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                    • Instruction Fuzzy Hash:
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                      • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                    • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                    • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                    • GetIconInfo.USER32(?,?), ref: 00418FBD
                                                                    • DeleteObject.GDI32(?), ref: 00418FEC
                                                                    • DeleteObject.GDI32(?), ref: 00418FF9
                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                    • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                    • DeleteDC.GDI32(?), ref: 0041917C
                                                                    • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                    • DeleteObject.GDI32(00000000), ref: 00419182
                                                                    • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                    • DeleteObject.GDI32(00000000), ref: 00419241
                                                                    • GlobalFree.KERNEL32(?), ref: 00419248
                                                                    • DeleteDC.GDI32(?), ref: 00419258
                                                                    • DeleteDC.GDI32(00000000), ref: 00419263
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                    • String ID: DISPLAY
                                                                    • API String ID: 479521175-865373369
                                                                    • Opcode ID: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                                                    • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                    • Opcode Fuzzy Hash: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                                                    • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                    • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                    • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                    • ResumeThread.KERNEL32(?), ref: 00418435
                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                    • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                    • GetLastError.KERNEL32 ref: 0041847A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                    • API String ID: 4188446516-3035715614
                                                                    • Opcode ID: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                    • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                    • Opcode Fuzzy Hash: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                                                    • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                    • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                    • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                    • API String ID: 1861856835-332907002
                                                                    • Opcode ID: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                    • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                    • Opcode Fuzzy Hash: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                                                    • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                                                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                    • ExitProcess.KERNEL32 ref: 0040D419
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                    • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                    • API String ID: 3797177996-2557013105
                                                                    • Opcode ID: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                    • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                    • Opcode Fuzzy Hash: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                                                    • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                    • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                    • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                    • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                    • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                    • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                    • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                    • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                    • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                    • API String ID: 2649220323-436679193
                                                                    • Opcode ID: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                    • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                    • Opcode Fuzzy Hash: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                                                    • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                    • SetEvent.KERNEL32 ref: 0041B219
                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                    • CloseHandle.KERNEL32 ref: 0041B23A
                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                    • API String ID: 738084811-2094122233
                                                                    • Opcode ID: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                    • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                    • Opcode Fuzzy Hash: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                                                    • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$Write$Create
                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                    • API String ID: 1602526932-4212202414
                                                                    • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                    • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                    • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                    • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe,00000001,0040764D,C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                    • API String ID: 1646373207-3615131186
                                                                    • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                    • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                    • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                    • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 0040CE07
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                    • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                                                    • _wcslen.LIBCMT ref: 0040CEE6
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                    • CopyFileW.KERNEL32(C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe,00000000,00000000), ref: 0040CF84
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                    • _wcslen.LIBCMT ref: 0040CFC6
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                    • ExitProcess.KERNEL32 ref: 0040D062
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                    • String ID: 6$C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe$del$open
                                                                    • API String ID: 1579085052-4143011260
                                                                    • Opcode ID: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                                                    • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                    • Opcode Fuzzy Hash: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                                                    • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                    • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                    • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                    • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                    • _wcslen.LIBCMT ref: 0041C13B
                                                                    • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                    • GetLastError.KERNEL32 ref: 0041C173
                                                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                    • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                    • GetLastError.KERNEL32 ref: 0041C1D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                    • String ID: ?
                                                                    • API String ID: 3941738427-1684325040
                                                                    • Opcode ID: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                    • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                    • Opcode Fuzzy Hash: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                                                    • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                    • String ID: IA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                    • API String ID: 2490988753-1941338355
                                                                    • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                    • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                    • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                    • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                    • String ID:
                                                                    • API String ID: 3899193279-0
                                                                    • Opcode ID: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                                                                    • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                    • Opcode Fuzzy Hash: 138887d55368f9cf58208da3f492a4fc17d417063cec38a58e843e9613042db9
                                                                    • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                    • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                    • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                    • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                    • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                    • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                    • String ID: /stext "$0TG$0TG$NG$NG
                                                                    • API String ID: 1223786279-2576077980
                                                                    • Opcode ID: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                    • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                    • Opcode Fuzzy Hash: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                    • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                    • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                    • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                    • ExitProcess.KERNEL32 ref: 0041D665
                                                                    • CreatePopupMenu.USER32 ref: 0041D66B
                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                    • String ID: Close
                                                                    • API String ID: 1657328048-3535843008
                                                                    • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                    • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                    • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                    • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$Info
                                                                    • String ID:
                                                                    • API String ID: 2509303402-0
                                                                    • Opcode ID: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                                                    • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                    • Opcode Fuzzy Hash: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                                                    • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                    • __aulldiv.LIBCMT ref: 00408D4D
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                    • API String ID: 3086580692-2582957567
                                                                    • Opcode ID: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                                                    • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                    • Opcode Fuzzy Hash: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                                                    • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                      • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                      • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                      • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                      • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,00000000,00000000,00000000), ref: 0040A927
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                    • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                    • API String ID: 3795512280-1152054767
                                                                    • Opcode ID: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                    • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                    • Opcode Fuzzy Hash: f9bf0f70ca639f6d962135a3ade2805c3c6b71e3802994e37fdf4666e5df7246
                                                                    • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • connect.WS2_32(?,?,?), ref: 004048E0
                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                    • WSAGetLastError.WS2_32 ref: 00404A21
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                    • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                    • API String ID: 994465650-3229884001
                                                                    • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                    • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                    • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                    • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                    • _free.LIBCMT ref: 004512FF
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00451321
                                                                    • _free.LIBCMT ref: 00451336
                                                                    • _free.LIBCMT ref: 00451341
                                                                    • _free.LIBCMT ref: 00451363
                                                                    • _free.LIBCMT ref: 00451376
                                                                    • _free.LIBCMT ref: 00451384
                                                                    • _free.LIBCMT ref: 0045138F
                                                                    • _free.LIBCMT ref: 004513C7
                                                                    • _free.LIBCMT ref: 004513CE
                                                                    • _free.LIBCMT ref: 004513EB
                                                                    • _free.LIBCMT ref: 00451403
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                    • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                    • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                                                                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041C726
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnumOpen
                                                                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                                                                    • API String ID: 1332880857-3730529168
                                                                    • Opcode ID: 9acb91869caa52ba962ff5e9cffe7dbf008cca4ae8889db815e50d5881a9b18e
                                                                    • Instruction ID: 30dd124696def6d144da0f01c12024620090e461f41beb3abd2b2340f2562d2c
                                                                    • Opcode Fuzzy Hash: 9acb91869caa52ba962ff5e9cffe7dbf008cca4ae8889db815e50d5881a9b18e
                                                                    • Instruction Fuzzy Hash: E961F3711082419AD325EF11D851EEFB3E8BF94309F10493FB589921A2FF789E49CA5A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog.LIBCMT ref: 00419FB9
                                                                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                    • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                    • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                    • API String ID: 489098229-1431523004
                                                                    • Opcode ID: 0a3c78d02fe8e2a34889c0781f83a9f873681b02ef9484db30951b5d4f55da13
                                                                    • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                    • Opcode Fuzzy Hash: 0a3c78d02fe8e2a34889c0781f83a9f873681b02ef9484db30951b5d4f55da13
                                                                    • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                                                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                                                      • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00413714
                                                                      • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 0041372D
                                                                      • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(?), ref: 00413738
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                    • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                    • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                    • API String ID: 1913171305-3159800282
                                                                    • Opcode ID: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                    • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                    • Opcode Fuzzy Hash: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                                                    • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                    • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                    • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                    • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                                                    • GetLastError.KERNEL32 ref: 00455CEF
                                                                    • __dosmaperr.LIBCMT ref: 00455CF6
                                                                    • GetFileType.KERNEL32(00000000), ref: 00455D02
                                                                    • GetLastError.KERNEL32 ref: 00455D0C
                                                                    • __dosmaperr.LIBCMT ref: 00455D15
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                    • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                    • GetLastError.KERNEL32 ref: 00455EB1
                                                                    • __dosmaperr.LIBCMT ref: 00455EB8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID: H
                                                                    • API String ID: 4237864984-2852464175
                                                                    • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                    • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                    • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                    • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,$C,0043EA24,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006), ref: 0044ACA3
                                                                    • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006,?,?,?), ref: 0044AD29
                                                                    • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,73E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                    • __freea.LIBCMT ref: 0044AE30
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    • __freea.LIBCMT ref: 0044AE39
                                                                    • __freea.LIBCMT ref: 0044AE5E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                    • String ID: $C$PkGNG
                                                                    • API String ID: 3864826663-3740547665
                                                                    • Opcode ID: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                                                    • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                    • Opcode Fuzzy Hash: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                                                    • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID: \&G$\&G$`&G
                                                                    • API String ID: 269201875-253610517
                                                                    • Opcode ID: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                                                    • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                    • Opcode Fuzzy Hash: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                                                    • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 65535$udp
                                                                    • API String ID: 0-1267037602
                                                                    • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                    • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                    • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                    • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                    • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                    • GetForegroundWindow.USER32 ref: 0040AD49
                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                                                    • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                    • String ID: [${ User has been idle for $ minutes }$]
                                                                    • API String ID: 911427763-3954389425
                                                                    • Opcode ID: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                                                    • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                    • Opcode Fuzzy Hash: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                                                    • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LongNamePath
                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                    • API String ID: 82841172-425784914
                                                                    • Opcode ID: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                                                    • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                    • Opcode Fuzzy Hash: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                                                    • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                    • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                    • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                    • __dosmaperr.LIBCMT ref: 0043A937
                                                                    • _free.LIBCMT ref: 0043A943
                                                                    • _free.LIBCMT ref: 0043A94A
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                    • String ID:
                                                                    • API String ID: 2441525078-0
                                                                    • Opcode ID: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                    • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                    • Opcode Fuzzy Hash: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                                                    • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                    • TranslateMessage.USER32(?), ref: 0040557E
                                                                    • DispatchMessageA.USER32(?), ref: 00405589
                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                    • API String ID: 2956720200-749203953
                                                                    • Opcode ID: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                                                    • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                    • Opcode Fuzzy Hash: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                                                    • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                    • String ID: 0VG$0VG$<$@$Temp
                                                                    • API String ID: 1704390241-2575729100
                                                                    • Opcode ID: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                                                    • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                    • Opcode Fuzzy Hash: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                                                    • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenClipboard.USER32 ref: 00416941
                                                                    • EmptyClipboard.USER32 ref: 0041694F
                                                                    • CloseClipboard.USER32 ref: 00416955
                                                                    • OpenClipboard.USER32 ref: 0041695C
                                                                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                    • CloseClipboard.USER32 ref: 00416984
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                    • String ID: !D@
                                                                    • API String ID: 2172192267-604454484
                                                                    • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                    • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                    • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                    • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                    • CloseHandle.KERNEL32(?), ref: 00413465
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                    • String ID:
                                                                    • API String ID: 297527592-0
                                                                    • Opcode ID: d52479866b96e43482c4aa3c72be572081a765f83d9ebd10744e03b07182f042
                                                                    • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                    • Opcode Fuzzy Hash: d52479866b96e43482c4aa3c72be572081a765f83d9ebd10744e03b07182f042
                                                                    • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                    • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                    • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                    • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 00448135
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00448141
                                                                    • _free.LIBCMT ref: 0044814C
                                                                    • _free.LIBCMT ref: 00448157
                                                                    • _free.LIBCMT ref: 00448162
                                                                    • _free.LIBCMT ref: 0044816D
                                                                    • _free.LIBCMT ref: 00448178
                                                                    • _free.LIBCMT ref: 00448183
                                                                    • _free.LIBCMT ref: 0044818E
                                                                    • _free.LIBCMT ref: 0044819C
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                    • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                    • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                    • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Eventinet_ntoa
                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                    • API String ID: 3578746661-3604713145
                                                                    • Opcode ID: b7e545620812273330383cc3efdd9bcfc3879d757bd19d7a259961bf1a4de7a6
                                                                    • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                    • Opcode Fuzzy Hash: b7e545620812273330383cc3efdd9bcfc3879d757bd19d7a259961bf1a4de7a6
                                                                    • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DecodePointer
                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                    • API String ID: 3527080286-3064271455
                                                                    • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                    • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                                    • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                    • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                    • __fassign.LIBCMT ref: 0044B479
                                                                    • __fassign.LIBCMT ref: 0044B494
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B4D9
                                                                    • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B512
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID: PkGNG
                                                                    • API String ID: 1324828854-263838557
                                                                    • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                    • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                    • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                    • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                    • Sleep.KERNEL32(00000064), ref: 00417521
                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                    • API String ID: 1462127192-2001430897
                                                                    • Opcode ID: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                    • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                    • Opcode Fuzzy Hash: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                                                    • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe), ref: 0040749E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CurrentProcess
                                                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                    • API String ID: 2050909247-4242073005
                                                                    • Opcode ID: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                    • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                    • Opcode Fuzzy Hash: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                                                    • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _strftime.LIBCMT ref: 00401D50
                                                                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                    • API String ID: 3809562944-243156785
                                                                    • Opcode ID: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                                                    • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                    • Opcode Fuzzy Hash: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                                                    • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                    • int.LIBCPMT ref: 00410E81
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                    • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                    • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                    • String ID: ,kG$0kG
                                                                    • API String ID: 3815856325-2015055088
                                                                    • Opcode ID: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                                                    • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                    • Opcode Fuzzy Hash: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                                                    • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                    • waveInStart.WINMM ref: 00401CFE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                    • String ID: dMG$|MG$PG
                                                                    • API String ID: 1356121797-532278878
                                                                    • Opcode ID: 993692589c413c6f5f0556b0fca4e76cf40985a39ae9ebd2fae1836bdcb2a895
                                                                    • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                    • Opcode Fuzzy Hash: 993692589c413c6f5f0556b0fca4e76cf40985a39ae9ebd2fae1836bdcb2a895
                                                                    • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                      • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                      • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                      • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                    • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                    • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                    • String ID: Remcos
                                                                    • API String ID: 1970332568-165870891
                                                                    • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                    • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                    • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                    • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                                                    • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                    • Opcode Fuzzy Hash: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                                                    • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(?,?), ref: 00453E2F
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453EB2
                                                                    • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453F45
                                                                    • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F5C
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FD8
                                                                    • __freea.LIBCMT ref: 00454003
                                                                    • __freea.LIBCMT ref: 0045400F
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                    • String ID:
                                                                    • API String ID: 201697637-0
                                                                    • Opcode ID: cf0f5bca4b9d7a6a0537f160270e877f32bb2155bdb84350bfddf98010c842c7
                                                                    • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                    • Opcode Fuzzy Hash: cf0f5bca4b9d7a6a0537f160270e877f32bb2155bdb84350bfddf98010c842c7
                                                                    • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                    • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                    • _free.LIBCMT ref: 00445494
                                                                    • _free.LIBCMT ref: 004454AD
                                                                    • _free.LIBCMT ref: 004454DF
                                                                    • _free.LIBCMT ref: 004454E8
                                                                    • _free.LIBCMT ref: 004454F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                    • String ID: C
                                                                    • API String ID: 1679612858-1037565863
                                                                    • Opcode ID: a8f4e868e6027df86e14abe5e970da0ea11d1bbd4f9432e493711607e9b70df4
                                                                    • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                    • Opcode Fuzzy Hash: a8f4e868e6027df86e14abe5e970da0ea11d1bbd4f9432e493711607e9b70df4
                                                                    • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: tcp$udp
                                                                    • API String ID: 0-3725065008
                                                                    • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                    • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                    • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                    • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                    • SetLastError.KERNEL32(000000C1,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                                                    • SetLastError.KERNEL32(0000000E), ref: 00411DC9
                                                                      • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,00411DE7,?,00000000,00003000,00000040,00000000), ref: 00411CB3
                                                                    • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00411E10
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00411E17
                                                                    • SetLastError.KERNEL32(0000045A), ref: 00411F2A
                                                                      • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                                                                      • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                    • String ID: t^F
                                                                    • API String ID: 3950776272-389975521
                                                                    • Opcode ID: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                                                    • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                    • Opcode Fuzzy Hash: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                                                    • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                    • ExitThread.KERNEL32 ref: 004018F6
                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                    • String ID: PkG$XMG$NG$NG
                                                                    • API String ID: 1649129571-3151166067
                                                                    • Opcode ID: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                    • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                    • Opcode Fuzzy Hash: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                                                    • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                                      • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                    • String ID: .part
                                                                    • API String ID: 1303771098-3499674018
                                                                    • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                    • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                    • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                    • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                    • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InputSend
                                                                    • String ID:
                                                                    • API String ID: 3431551938-0
                                                                    • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                    • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                    • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                    • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __freea$__alloca_probe_16_free
                                                                    • String ID: a/p$am/pm$zD
                                                                    • API String ID: 2936374016-2723203690
                                                                    • Opcode ID: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                    • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                    • Opcode Fuzzy Hash: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                                                    • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Enum$InfoQueryValue
                                                                    • String ID: [regsplt]$xUG$TG
                                                                    • API String ID: 3554306468-1165877943
                                                                    • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                    • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                    • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                    • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                                                      • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                      • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnumInfoOpenQuerysend
                                                                    • String ID: xUG$NG$NG$TG
                                                                    • API String ID: 3114080316-2811732169
                                                                    • Opcode ID: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                                                    • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                    • Opcode Fuzzy Hash: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                                                    • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F8C8,?,00000000,?,00000001,?,000000FF,00000001,0043F8C8,?), ref: 00451179
                                                                    • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451202
                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451214
                                                                    • __freea.LIBCMT ref: 0045121D
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                    • String ID: PkGNG
                                                                    • API String ID: 313313983-263838557
                                                                    • Opcode ID: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                    • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                    • Opcode Fuzzy Hash: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                                                    • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                      • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                      • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                    • _wcslen.LIBCMT ref: 0041B763
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                    • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                    • API String ID: 37874593-122982132
                                                                    • Opcode ID: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                    • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                    • Opcode Fuzzy Hash: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                                                    • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                      • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                      • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                    • API String ID: 1133728706-4073444585
                                                                    • Opcode ID: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                                                    • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                    • Opcode Fuzzy Hash: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                                                    • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                                                    • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                    • Opcode Fuzzy Hash: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                                                    • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                    • _free.LIBCMT ref: 00450F48
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00450F53
                                                                    • _free.LIBCMT ref: 00450F5E
                                                                    • _free.LIBCMT ref: 00450FB2
                                                                    • _free.LIBCMT ref: 00450FBD
                                                                    • _free.LIBCMT ref: 00450FC8
                                                                    • _free.LIBCMT ref: 00450FD3
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                    • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                    • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                    • int.LIBCPMT ref: 00411183
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                    • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                    • String ID: (mG
                                                                    • API String ID: 2536120697-4059303827
                                                                    • Opcode ID: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                    • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                    • Opcode Fuzzy Hash: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                                                    • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                      • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                      • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                      • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                                                    • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCurrentOpenProcessQueryValue
                                                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                    • API String ID: 1866151309-2070987746
                                                                    • Opcode ID: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                    • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                    • Opcode Fuzzy Hash: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                                                    • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                    • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                    • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                    • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                    • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe), ref: 004075D0
                                                                      • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                      • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                    • CoUninitialize.OLE32 ref: 00407629
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InitializeObjectUninitialize_wcslen
                                                                    • String ID: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                    • API String ID: 3851391207-1218573870
                                                                    • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                    • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                    • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                    • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                    • GetLastError.KERNEL32 ref: 0040BAE7
                                                                    Strings
                                                                    • UserProfile, xrefs: 0040BAAD
                                                                    • [Chrome Cookies not found], xrefs: 0040BB01
                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteErrorFileLast
                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                    • API String ID: 2018770650-304995407
                                                                    • Opcode ID: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                                                    • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                    • Opcode Fuzzy Hash: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                                                    • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Console$AllocOutputShowWindow
                                                                    • String ID: Remcos v$4.9.4 Pro$CONOUT$
                                                                    • API String ID: 2425139147-3065609815
                                                                    • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                    • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                    • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                    • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002), ref: 0044335A
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG), ref: 00443390
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$PkGNG$mscoree.dll
                                                                    • API String ID: 4061214504-213444651
                                                                    • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                    • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                    • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                    • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __allrem.LIBCMT ref: 0043AC69
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                    • __allrem.LIBCMT ref: 0043AC9C
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                    • __allrem.LIBCMT ref: 0043ACD1
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1992179935-0
                                                                    • Opcode ID: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                                                                    • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                    • Opcode Fuzzy Hash: 62332627f6279ece4fdf0222086194dbbb93a47f3123b1b6f0685f97dcd8be1f
                                                                    • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                                                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: H_prologSleep
                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                    • API String ID: 3469354165-3054508432
                                                                    • Opcode ID: 180fc6eb72b116d827b034a49e1adc61e94a7e22018ecd165a1f07ef89b3401f
                                                                    • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                    • Opcode Fuzzy Hash: 180fc6eb72b116d827b034a49e1adc61e94a7e22018ecd165a1f07ef89b3401f
                                                                    • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __cftoe
                                                                    • String ID:
                                                                    • API String ID: 4189289331-0
                                                                    • Opcode ID: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                    • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                    • Opcode Fuzzy Hash: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                                                    • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                    • String ID:
                                                                    • API String ID: 493672254-0
                                                                    • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                                    • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                    • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                                    • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID: PkGNG
                                                                    • API String ID: 1036877536-263838557
                                                                    • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                    • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                    • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                                    • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                                                    • _free.LIBCMT ref: 0044824C
                                                                    • _free.LIBCMT ref: 00448274
                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                                                    • _abort.LIBCMT ref: 00448293
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                    • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                    • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                    • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                    • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                    • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                    • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                                    • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                    • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                                    • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                    • String ID:
                                                                    • API String ID: 221034970-0
                                                                    • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                                    • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                    • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                                    • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PkGNG
                                                                    • API String ID: 0-263838557
                                                                    • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                    • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                    • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                    • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                                                    • CloseHandle.KERNEL32(?), ref: 00404DDB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                    • String ID: PkGNG
                                                                    • API String ID: 3360349984-263838557
                                                                    • Opcode ID: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                                                    • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                    • Opcode Fuzzy Hash: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                                                    • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                    • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                    • String ID: XQG
                                                                    • API String ID: 1958988193-3606453820
                                                                    • Opcode ID: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                    • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                    • Opcode Fuzzy Hash: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                                                    • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                    • GetLastError.KERNEL32 ref: 0041D580
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                    • String ID: 0$MsgWindowClass
                                                                    • API String ID: 2877667751-2410386613
                                                                    • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                    • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                    • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                    • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                    • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                    • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                    Strings
                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                    • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandle$CreateProcess
                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                    • API String ID: 2922976086-4183131282
                                                                    • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                    • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                    • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                    • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • SG, xrefs: 004076DA
                                                                    • C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe, xrefs: 004076C4
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: SG$C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                    • API String ID: 0-376252790
                                                                    • Opcode ID: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                    • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                    • Opcode Fuzzy Hash: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                                                    • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                                                    • SetEvent.KERNEL32(?), ref: 0040512C
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                                                    • CloseHandle.KERNEL32(?), ref: 00405140
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                    • String ID: KeepAlive | Disabled
                                                                    • API String ID: 2993684571-305739064
                                                                    • Opcode ID: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                    • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                    • Opcode Fuzzy Hash: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                                                    • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                    • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                    • String ID: Alarm triggered
                                                                    • API String ID: 614609389-2816303416
                                                                    • Opcode ID: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                                                    • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                    • Opcode Fuzzy Hash: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                                                    • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                                                    Strings
                                                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                    • API String ID: 3024135584-2418719853
                                                                    • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                    • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                    • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                    • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                    • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                    • Opcode Fuzzy Hash: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                                                    • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    • _free.LIBCMT ref: 00444E06
                                                                    • _free.LIBCMT ref: 00444E1D
                                                                    • _free.LIBCMT ref: 00444E3C
                                                                    • _free.LIBCMT ref: 00444E57
                                                                    • _free.LIBCMT ref: 00444E6E
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 3033488037-0
                                                                    • Opcode ID: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                                                    • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                    • Opcode Fuzzy Hash: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                                                    • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                      • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 4269425633-0
                                                                    • Opcode ID: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                    • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                    • Opcode Fuzzy Hash: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                                                    • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                    • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                    • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                    • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                    • _free.LIBCMT ref: 0044F3BF
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                    • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                    • Opcode Fuzzy Hash: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                                                    • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C44D
                                                                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C459
                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,00406F85,00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C46A
                                                                    • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C477
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseHandle$CreatePointerWrite
                                                                    • String ID:
                                                                    • API String ID: 1852769593-0
                                                                    • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                    • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                    • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                    • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 004509D4
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 004509E6
                                                                    • _free.LIBCMT ref: 004509F8
                                                                    • _free.LIBCMT ref: 00450A0A
                                                                    • _free.LIBCMT ref: 00450A1C
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                    • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                    • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 00444066
                                                                      • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                    • _free.LIBCMT ref: 00444078
                                                                    • _free.LIBCMT ref: 0044408B
                                                                    • _free.LIBCMT ref: 0044409C
                                                                    • _free.LIBCMT ref: 004440AD
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                    • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                    • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: PkGNG
                                                                    • API String ID: 0-263838557
                                                                    • Opcode ID: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                                                    • Instruction ID: 56b21f6c39f874414c878b072b89285690216c2d241c0ad811085e1835033e53
                                                                    • Opcode Fuzzy Hash: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                                                    • Instruction Fuzzy Hash: 1B51B271D00249AAEF14DFA9C885FAFBBB8EF45314F14015FE400A7291DB78D901CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CountEventTick
                                                                    • String ID: !D@$NG
                                                                    • API String ID: 180926312-2721294649
                                                                    • Opcode ID: 068e9cc0715a92df8d739c6ab064f289f55cbcf881b4b95b9b6ab27274b13f38
                                                                    • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                    • Opcode Fuzzy Hash: 068e9cc0715a92df8d739c6ab064f289f55cbcf881b4b95b9b6ab27274b13f38
                                                                    • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                      • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                                                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                    • String ID: XQG$NG$PG
                                                                    • API String ID: 1634807452-3565412412
                                                                    • Opcode ID: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                                                    • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                    • Opcode Fuzzy Hash: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                                                    • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                    • String ID: `#D$`#D
                                                                    • API String ID: 885266447-2450397995
                                                                    • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                    • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                    • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                    • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe,00000104), ref: 00443475
                                                                    • _free.LIBCMT ref: 00443540
                                                                    • _free.LIBCMT ref: 0044354A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
                                                                    • API String ID: 2506810119-2467806863
                                                                    • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                    • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                    • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                    • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B900
                                                                    • GetLastError.KERNEL32 ref: 0044B931
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                    • String ID: PkGNG
                                                                    • API String ID: 2456169464-263838557
                                                                    • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                    • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
                                                                    • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                    • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                    • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                    • String ID: /sort "Visit Time" /stext "$0NG
                                                                    • API String ID: 368326130-3219657780
                                                                    • Opcode ID: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                    • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                    • Opcode Fuzzy Hash: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                                                    • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 004162F5
                                                                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                      • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                      • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wcslen$CloseCreateValue
                                                                    • String ID: !D@$okmode$PG
                                                                    • API String ID: 3411444782-3370592832
                                                                    • Opcode ID: 4953b4e4a8c13c8acb6e7384e138a9f0719d67908b9bf54edc95309011813b1f
                                                                    • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                    • Opcode Fuzzy Hash: 4953b4e4a8c13c8acb6e7384e138a9f0719d67908b9bf54edc95309011813b1f
                                                                    • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                    Strings
                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                    • API String ID: 1174141254-1980882731
                                                                    • Opcode ID: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                    • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                    • Opcode Fuzzy Hash: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                                                    • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                    Strings
                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                    • API String ID: 1174141254-1980882731
                                                                    • Opcode ID: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                    • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                    • Opcode Fuzzy Hash: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                                                    • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A27D,004750F0,00000000,00000000), ref: 0040A1FE
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A267,004750F0,00000000,00000000), ref: 0040A20E
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A289,004750F0,00000000,00000000), ref: 0040A21A
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                    • String ID: Offline Keylogger Started
                                                                    • API String ID: 465354869-4114347211
                                                                    • Opcode ID: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                    • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                    • Opcode Fuzzy Hash: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                                                    • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040AF6E
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040AF7A
                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                    • String ID: Online Keylogger Started
                                                                    • API String ID: 112202259-1258561607
                                                                    • Opcode ID: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                                                    • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                    • Opcode Fuzzy Hash: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                                                    • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                                                    • API String ID: 481472006-3277280411
                                                                    • Opcode ID: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                    • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                    • Opcode Fuzzy Hash: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                                                    • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                                    • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                                                    Strings
                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Create$EventLocalThreadTime
                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                    • API String ID: 2532271599-1507639952
                                                                    • Opcode ID: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                                                    • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                    • Opcode Fuzzy Hash: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                                                    • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: CryptUnprotectData$crypt32
                                                                    • API String ID: 2574300362-2380590389
                                                                    • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                    • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                    • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                    • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C302,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C28C
                                                                    • GetLastError.KERNEL32 ref: 0044C296
                                                                    • __dosmaperr.LIBCMT ref: 0044C29D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                    • String ID: PkGNG
                                                                    • API String ID: 2336955059-263838557
                                                                    • Opcode ID: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                    • Instruction ID: 03228b3a5a263cac3d3762c0c6cb9bea0ee6cefe7ee70a3785aa569069518732
                                                                    • Opcode Fuzzy Hash: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                                                    • Instruction Fuzzy Hash: 9E016D32A11104BBDF008FE9CC4089E3719FB86320B28039AF810A7290EAB5DC118B64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                    • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                    • SetEvent.KERNEL32(?), ref: 004051D9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                    • String ID: Connection Timeout
                                                                    • API String ID: 2055531096-499159329
                                                                    • Opcode ID: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                    • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                    • Opcode Fuzzy Hash: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                                                    • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Exception@8Throw
                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                    • API String ID: 2005118841-1866435925
                                                                    • Opcode ID: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                    • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                    • Opcode Fuzzy Hash: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                                                    • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB09
                                                                    • LocalFree.KERNEL32(?,?), ref: 0041CB2F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FormatFreeLocalMessage
                                                                    • String ID: @J@$PkGNG
                                                                    • API String ID: 1427518018-1416487119
                                                                    • Opcode ID: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                    • Instruction ID: 02a9d8e2c753fe243ccbc909122ce1ddd8f8b45a09ed5088e6b723b988b0f700
                                                                    • Opcode Fuzzy Hash: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                    • Instruction Fuzzy Hash: 5EF0A434B0021AAADF08A7A6DD4ADFF7769DB84305B10007FB606B21D1EEB86D05D659
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041381F
                                                                    • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,74DF37E0,?), ref: 0041384D
                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,74DF37E0,?,?,?,?,?,0040CFAA,?,00000000), ref: 00413858
                                                                    Strings
                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041381D
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateValue
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                    • API String ID: 1818849710-1051519024
                                                                    • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                    • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                    • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                    • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                    • String ID: bad locale name
                                                                    • API String ID: 3628047217-1405518554
                                                                    • Opcode ID: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                                                    • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                    • Opcode Fuzzy Hash: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                                                    • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                                                    • RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                                                    • RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseCreateValue
                                                                    • String ID: Control Panel\Desktop
                                                                    • API String ID: 1818849710-27424756
                                                                    • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                    • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                    • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                    • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                    • ShowWindow.USER32(00000009), ref: 00416C61
                                                                    • SetForegroundWindow.USER32 ref: 00416C6D
                                                                      • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                      • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                      • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                                    • String ID: !D@
                                                                    • API String ID: 3446828153-604454484
                                                                    • Opcode ID: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                                                    • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                    • Opcode Fuzzy Hash: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                                                    • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteShell
                                                                    • String ID: /C $cmd.exe$open
                                                                    • API String ID: 587946157-3896048727
                                                                    • Opcode ID: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                    • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                    • Opcode Fuzzy Hash: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                                                    • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: GetCursorInfo$User32.dll
                                                                    • API String ID: 1646373207-2714051624
                                                                    • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                    • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                    • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                    • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetLastInputInfo$User32.dll
                                                                    • API String ID: 2574300362-1519888992
                                                                    • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                    • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                    • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                    • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                    • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                    • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                    • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                    • API String ID: 3472027048-1236744412
                                                                    • Opcode ID: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                    • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                    • Opcode Fuzzy Hash: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                                                    • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                      • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                      • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                    • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                    • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                    • String ID: [ $ ]
                                                                    • API String ID: 3309952895-93608704
                                                                    • Opcode ID: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                    • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                    • Opcode Fuzzy Hash: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                                                    • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                    • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                    • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                    • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                    • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                    • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                    • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4B2
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4D7
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E74), ref: 0041C4E5
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                    • String ID:
                                                                    • API String ID: 3919263394-0
                                                                    • Opcode ID: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                    • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                    • Opcode Fuzzy Hash: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                                                    • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseHandleOpenProcess
                                                                    • String ID:
                                                                    • API String ID: 39102293-0
                                                                    • Opcode ID: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                    • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                    • Opcode Fuzzy Hash: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                                                    • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                      • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                    • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                    • String ID:
                                                                    • API String ID: 2633735394-0
                                                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                    • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                    • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                    • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                    • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                    • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: MetricsSystem
                                                                    • String ID:
                                                                    • API String ID: 4116985748-0
                                                                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                    • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                    • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                      • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                    • String ID:
                                                                    • API String ID: 1761009282-0
                                                                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                    • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                    • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorHandling__start
                                                                    • String ID: pow
                                                                    • API String ID: 3213639722-2276729525
                                                                    • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                    • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                    • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                    • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F0F
                                                                    • GetLastError.KERNEL32 ref: 00449F2B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharErrorLastMultiWide
                                                                    • String ID: PkGNG
                                                                    • API String ID: 203985260-263838557
                                                                    • Opcode ID: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                                                    • Instruction ID: 5218313022fb824330162c1b3e1e252a07855a0508c927524b2412b0d5c8e50b
                                                                    • Opcode Fuzzy Hash: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                                                    • Instruction Fuzzy Hash: A531F831600205EBEB21EF56C845BAB77A8DF55711F24416BF9048B3D1DB38CD41E7A9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Init_thread_footer__onexit
                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                    • API String ID: 1881088180-3686566968
                                                                    • Opcode ID: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                    • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                    • Opcode Fuzzy Hash: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                                                    • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C12
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 0-711371036
                                                                    • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                    • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                    • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                    • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
                                                                    • GetLastError.KERNEL32 ref: 0044B804
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID: PkGNG
                                                                    • API String ID: 442123175-263838557
                                                                    • Opcode ID: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                    • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
                                                                    • Opcode Fuzzy Hash: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                                                    • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
                                                                    • GetLastError.KERNEL32 ref: 0044B716
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID: PkGNG
                                                                    • API String ID: 442123175-263838557
                                                                    • Opcode ID: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                    • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
                                                                    • Opcode Fuzzy Hash: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                                                    • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                    Strings
                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                    • API String ID: 481472006-1507639952
                                                                    • Opcode ID: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                                                    • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                    • Opcode Fuzzy Hash: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                                                    • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Sleep.KERNEL32 ref: 00416640
                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DownloadFileSleep
                                                                    • String ID: !D@
                                                                    • API String ID: 1931167962-604454484
                                                                    • Opcode ID: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                    • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                    • Opcode Fuzzy Hash: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                                                    • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: alarm.wav$hYG
                                                                    • API String ID: 1174141254-2782910960
                                                                    • Opcode ID: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                                                    • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                    • Opcode Fuzzy Hash: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                                                    • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                                                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                    • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                    • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                    • String ID: Online Keylogger Stopped
                                                                    • API String ID: 1623830855-1496645233
                                                                    • Opcode ID: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                    • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                    • Opcode Fuzzy Hash: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                                                    • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,73E85006,00000001,?,0043CE55), ref: 00448C24
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: String
                                                                    • String ID: LCMapStringEx$PkGNG
                                                                    • API String ID: 2568140703-1065776982
                                                                    • Opcode ID: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                                                    • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                                                    • Opcode Fuzzy Hash: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                                                    • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: wave$BufferHeaderPrepare
                                                                    • String ID: XMG
                                                                    • API String ID: 2315374483-813777761
                                                                    • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                    • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LocaleValid
                                                                    • String ID: IsValidLocaleName$JD
                                                                    • API String ID: 1901932003-2234456777
                                                                    • Opcode ID: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                                                    • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                    • Opcode Fuzzy Hash: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                                                    • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                    • API String ID: 1174141254-4188645398
                                                                    • Opcode ID: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                    • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                    • Opcode Fuzzy Hash: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                                                    • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                    • API String ID: 1174141254-2800177040
                                                                    • Opcode ID: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                    • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                    • Opcode Fuzzy Hash: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                                                    • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExistsFilePath
                                                                    • String ID: AppData$\Opera Software\Opera Stable\
                                                                    • API String ID: 1174141254-1629609700
                                                                    • Opcode ID: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                    • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                    • Opcode Fuzzy Hash: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                                                    • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                      • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                      • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                      • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                      • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                      • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                    • String ID: [AltL]$[AltR]
                                                                    • API String ID: 2738857842-2658077756
                                                                    • Opcode ID: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                    • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                    • Opcode Fuzzy Hash: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                                                    • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                    • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: uD
                                                                    • API String ID: 0-2547262877
                                                                    • Opcode ID: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                                                    • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                    • Opcode Fuzzy Hash: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                                                    • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Time$FileSystem
                                                                    • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                                                    • API String ID: 2086374402-949981407
                                                                    • Opcode ID: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                    • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                                    • Opcode Fuzzy Hash: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                                                    • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExecuteShell
                                                                    • String ID: !D@$open
                                                                    • API String ID: 587946157-1586967515
                                                                    • Opcode ID: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                    • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                    • Opcode Fuzzy Hash: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                                                    • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___initconout.LIBCMT ref: 0045555B
                                                                      • Part of subcall function 00456B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00455560,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000), ref: 00456B30
                                                                    • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB19,?), ref: 0045557E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ConsoleCreateFileWrite___initconout
                                                                    • String ID: PkGNG
                                                                    • API String ID: 3087715906-263838557
                                                                    • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                    • Instruction ID: e84ccb038854987deafcb7b601af55b429ad8f27f18c1f17be9b2782bd97289a
                                                                    • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                                    • Instruction Fuzzy Hash: 10E02B70500508BBD610CB64DC25EB63319EB003B1F600315FE25C72D1EB34DD44C759
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: State
                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                    • API String ID: 1649606143-2446555240
                                                                    • Opcode ID: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                    • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                    • Opcode Fuzzy Hash: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                                                    • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                    • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Init_thread_footer__onexit
                                                                    • String ID: ,kG$0kG
                                                                    • API String ID: 1881088180-2015055088
                                                                    • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                    • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                    • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                                                    • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D4CE,00000000,?,00000000), ref: 00413A31
                                                                    • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A45
                                                                    Strings
                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DeleteOpenValue
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                    • API String ID: 2654517830-1051519024
                                                                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                    • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                    • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                    • GetLastError.KERNEL32 ref: 00440D35
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                                                    • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                    • Opcode Fuzzy Hash: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                                                    • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                                                    • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                                                    • SetLastError.KERNEL32(0000007F), ref: 00411C7A
                                                                    • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                    Memory Dump Source
                                                                    • Source File: 0000000C.00000002.1743408146.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_12_2_400000_KGuxmqSTXgJca.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastRead
                                                                    • String ID:
                                                                    • API String ID: 4100373531-0
                                                                    • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                    • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                    • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                    • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%