Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5yTEUojIn0.exe

Overview

General Information

Sample name:5yTEUojIn0.exe
renamed because original name is a hash value
Original sample name:562d1237cff600c083ccafa09d3ce40d.exe
Analysis ID:1553459
MD5:562d1237cff600c083ccafa09d3ce40d
SHA1:45cd37f39fe3f906f593a7cc2ba9d55e0d33a04e
SHA256:1b1ef9723eb894aae6e3759a352eff67be3057d6619dabc32e4914ca658ac85a
Tags:exeuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 5yTEUojIn0.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\5yTEUojIn0.exe" MD5: 562D1237CFF600C083CCAFA09D3CE40D)
    • WerFault.exe (PID: 7840 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7408 -s 1304 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1020:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000003.1370478954.0000000002D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          0.2.5yTEUojIn0.exe.2d00e67.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.5yTEUojIn0.exe.2d00e67.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.5yTEUojIn0.exe.2d40000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.5yTEUojIn0.exe.2d40000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.5yTEUojIn0.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-11T09:01:18.387196+010020229301A Network Trojan was detected52.149.20.212443192.168.2.849707TCP
                    2024-11-11T09:01:55.787415+010020229301A Network Trojan was detected52.149.20.212443192.168.2.849714TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://77.83.175.91/rAvira URL Cloud: Label: malware
                    Source: http://77.83.175.91/XAvira URL Cloud: Label: malware
                    Source: http://77.83.175.91/oAvira URL Cloud: Label: malware
                    Source: http://77.83.175.91/7Avira URL Cloud: Label: malware
                    Source: http://77.83.175.91Avira URL Cloud: Label: malware
                    Source: http://77.83.175.91/Avira URL Cloud: Label: malware
                    Source: http://77.83.175.91/CAvira URL Cloud: Label: malware
                    Source: 5yTEUojIn0.exeReversingLabs: Detection: 60%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: 5yTEUojIn0.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00404C50 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,0_2_00404C50
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004060D0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,0_2_004060D0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004240B0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_004240B0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00407750 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407750
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00409B20 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409B20
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00409B80 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B80
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D04EB7 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_02D04EB7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D16BC7 lstrcpy,SHGetFolderPathA,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,LocalAlloc,strtok_s,lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,0_2_02D16BC7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D24317 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_02D24317
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D06337 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlen,lstrlen,GetProcessHeap,RtlAllocateHeap,lstrlen,memcpy,lstrlen,lstrlen,memcpy,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_02D06337
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0EC97 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,0_2_02D0EC97
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D16DE0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,GetProcessHeap,RtlAllocateHeap,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,StrStrA,lstrlen,malloc,strncpy,lstrcpy,lstrcpy,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrlen,lstrlen,lstrlen,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,strtok_s,lstrlen,lstrcpy,memset,0_2_02D16DE0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D09DE7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_02D09DE7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D09D87 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_02D09D87
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D079B7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_02D079B7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeUnpacked PE file: 0.2.5yTEUojIn0.exe.400000.0.unpack
                    Source: 5yTEUojIn0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1CE47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D1CE47
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0DE00 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D0DE00
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1D797 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D1D797
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1DF97 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,0_2_02D1DF97
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D13B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D13B77
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D11B07 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D11B07
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D114D0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D114D0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D114B7 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D114B7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1E477 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D1E477
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0DDE7 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,GetFileAttributesA,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D0DDE7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D14D90 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,0_2_02D14D90
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D14D77 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D14D77
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D01907 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D01907
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D01920 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,0_2_02D01920
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 77.83.175.91Connection: Keep-AliveCache-Control: no-cache
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.8:49714
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.8:49707
                    Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.91
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00406C40 lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,lstrcpy,0_2_00406C40
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 77.83.175.91Connection: Keep-AliveCache-Control: no-cache
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1651941962.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmp, 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/7
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/C
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/X
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/o
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91/r
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1651941962.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.91=-
                    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00409770 memset,memset,lstrcatA,lstrcatA,lstrcatA,memset,wsprintfA,OpenDesktopA,CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,memset,SHGetFolderPathA,lstrcpy,StrStrA,lstrcpyn,lstrlenA,wsprintfA,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,0_2_00409770

                    System Summary

                    barindex
                    Source: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D24B170_2_02D24B17
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: String function: 00404A60 appears 317 times
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7408 -s 1304
                    Source: 5yTEUojIn0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 5yTEUojIn0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004246A0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,0_2_004246A0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1CD47 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_02D1CD47
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7408
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2898db87-0e25-4359-b326-48c5dc1cf284Jump to behavior
                    Source: 5yTEUojIn0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 5yTEUojIn0.exeReversingLabs: Detection: 60%
                    Source: unknownProcess created: C:\Users\user\Desktop\5yTEUojIn0.exe "C:\Users\user\Desktop\5yTEUojIn0.exe"
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7408 -s 1304
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeUnpacked PE file: 0.2.5yTEUojIn0.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.wizave:W;.rsrc:R;.reloc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeUnpacked PE file: 0.2.5yTEUojIn0.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004266E0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004266E0
                    Source: 5yTEUojIn0.exeStatic PE information: section name: .wizave
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_0040E281 push 8BFFFFFFh; ret 0_2_0040E286
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D27AFC push ecx; ret 0_2_02D27B0F
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02DFCE8B pushad ; iretd 0_2_02DFCE8C
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02DFAD88 push ebx; ret 0_2_02DFAE06
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02DFBDA4 push 00000032h; retf 0_2_02DFBDA6
                    Source: 5yTEUojIn0.exeStatic PE information: section name: .text entropy: 7.105156439121909
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004266E0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004266E0
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-29736
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeAPI coverage: 3.0 %
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1CE47 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,CreateFileA,GetFileSizeEx,CloseHandle,CloseHandle,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D1CE47
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0DE00 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D0DE00
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1D797 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D1D797
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1DF97 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,lstrcpy,0_2_02D1DF97
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D13B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,DeleteFileA,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D13B77
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D11B07 lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D11B07
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D114D0 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D114D0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D114B7 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D114B7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D1E477 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D1E477
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0DDE7 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,StrCmpCA,lstrcpy,GetFileAttributesA,StrCmpCA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,StrCmpCA,DeleteFileA,StrCmpCA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D0DDE7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D14D90 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,0_2_02D14D90
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D14D77 lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,StrCmpCA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,CopyFileA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,DeleteFileA,lstrcpy,lstrcpy,lstrcpy,FindNextFileA,FindClose,0_2_02D14D77
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D01907 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,GetFileAttributesA,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,CopyFileA,lstrcpy,lstrcpy,DeleteFileA,FindNextFileA,FindClose,0_2_02D01907
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D01920 lstrcpy,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrlen,lstrcpy,lstrcat,lstrcpy,FindFirstFileA,0_2_02D01920
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00421BF0 EntryPoint,GetSystemInfo,GetUserDefaultLangID,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,OpenEventA,CreateEventA,0_2_00421BF0
                    Source: Amcache.hve.6.drBinary or memory string: VMware
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E6D000.00000004.00000020.00020000.00000000.sdmp, 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareIm
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: 5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeAPI call chain: ExitProcess graph end nodegraph_0-30911
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeAPI call chain: ExitProcess graph end nodegraph_0-30919
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeAPI call chain: ExitProcess graph end nodegraph_0-30932
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D27E01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02D27E01
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00404A60 VirtualProtect 00000000,00000004,00000100,?0_2_00404A60
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004266E0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004266E0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00426390 mov eax, dword ptr fs:[00000030h]0_2_00426390
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D265F7 mov eax, dword ptr fs:[00000030h]0_2_02D265F7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D00D90 mov eax, dword ptr fs:[00000030h]0_2_02D00D90
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D0092B mov eax, dword ptr fs:[00000030h]0_2_02D0092B
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02DF992B push dword ptr fs:[00000030h]0_2_02DF992B
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00405640 GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetOpenUrlA,memcpy,InternetReadFile,KiUserExceptionDispatcher,InternetCloseHandle,InternetCloseHandle,0_2_00405640
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D27E01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02D27E01
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D2781F memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02D2781F
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D299E0 SetUnhandledExceptionFilter,0_2_02D299E0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 5yTEUojIn0.exe PID: 7408, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_004246A0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,0_2_004246A0
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D24877 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,Process32Next,CloseHandle,0_2_02D24877
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D24907 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,0_2_02D24907
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_02D22FC7
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00423E70 lstrcpy,lstrcpy,GetSystemTime,0_2_00423E70
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_00422A40 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00422A40
                    Source: C:\Users\user\Desktop\5yTEUojIn0.exeCode function: 0_2_02D22E77 GetProcessHeap,RtlAllocateHeap,GetTimeZoneInformation,wsprintfA,0_2_02D22E77
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.2d00e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.2d00e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.5yTEUojIn0.exe.2d40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.5yTEUojIn0.exe.2d40000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1370478954.0000000002D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5yTEUojIn0.exe PID: 7408, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.2d00e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.2d00e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.5yTEUojIn0.exe.2d40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.5yTEUojIn0.exe.2d40000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.5yTEUojIn0.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1370478954.0000000002D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 5yTEUojIn0.exe PID: 7408, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Native API
                    1
                    Create Account
                    11
                    Process Injection
                    11
                    Disable or Modify Tools
                    OS Credential Dumping2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager12
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                    Obfuscated Files or Information
                    NTDS1
                    Account Discovery
                    Distributed Component Object ModelInput Capture1
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                    Software Packing
                    LSA Secrets1
                    System Owner/User Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    5yTEUojIn0.exe61%ReversingLabsWin32.Spyware.Stealc
                    5yTEUojIn0.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://77.83.175.91=-0%Avira URL Cloudsafe
                    http://77.83.175.91/r100%Avira URL Cloudmalware
                    http://77.83.175.91/X100%Avira URL Cloudmalware
                    http://77.83.175.91/o100%Avira URL Cloudmalware
                    http://77.83.175.91/7100%Avira URL Cloudmalware
                    http://77.83.175.91100%Avira URL Cloudmalware
                    http://77.83.175.91/100%Avira URL Cloudmalware
                    http://77.83.175.91/C100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://77.83.175.91/false
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://77.83.175.91/o5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://77.83.175.91=-5yTEUojIn0.exe, 00000000.00000002.1651941962.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://upx.sf.netAmcache.hve.6.drfalse
                      high
                      http://77.83.175.915yTEUojIn0.exe, 00000000.00000002.1651941962.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.83.175.91/X5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.83.175.91/75yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.83.175.91/r5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.83.175.91/C5yTEUojIn0.exe, 00000000.00000002.1652011112.0000000002E59000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      77.83.175.91
                      unknownUkraine
                      204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1553459
                      Start date and time:2024-11-11 09:00:08 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 43s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:11
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:5yTEUojIn0.exe
                      renamed because original name is a hash value
                      Original Sample Name:562d1237cff600c083ccafa09d3ce40d.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@2/5@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 24
                      • Number of non-executed functions: 174
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.42.65.92
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: 5yTEUojIn0.exe
                      TimeTypeDescription
                      03:01:29API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      77.83.175.91Vl9Yz1UB1a.exeGet hashmaliciousStealc, VidarBrowse
                      • 77.83.175.91/69d96d770568584a.php
                      PtGMWtcZF0.exeGet hashmaliciousStealcBrowse
                      • 77.83.175.91/69d96d770568584a.php
                      yjNy22UmmY.exeGet hashmaliciousStealcBrowse
                      • 77.83.175.91/69d96d770568584a.php
                      g8Z5OO8o6p.exeGet hashmaliciousStealc, VidarBrowse
                      • 77.83.175.91/69d96d770568584a.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ON-LINE-DATAServerlocation-NetherlandsDrontenNLDihoyYp8ie.exeGet hashmaliciousStealc, VidarBrowse
                      • 45.88.76.207
                      Vl9Yz1UB1a.exeGet hashmaliciousStealc, VidarBrowse
                      • 77.83.175.91
                      PtGMWtcZF0.exeGet hashmaliciousStealcBrowse
                      • 77.83.175.91
                      yjNy22UmmY.exeGet hashmaliciousStealcBrowse
                      • 77.83.175.91
                      g8Z5OO8o6p.exeGet hashmaliciousStealc, VidarBrowse
                      • 77.83.175.91
                      pUxjpMo3jy.exeGet hashmaliciousStealcBrowse
                      • 77.220.212.32
                      hmCj47OtqK.exeGet hashmaliciousStealcBrowse
                      • 77.220.212.32
                      G5SNsomm2h.exeGet hashmaliciousStealcBrowse
                      • 77.220.212.32
                      uXLmpbLJnV.exeGet hashmaliciousStealcBrowse
                      • 77.220.212.32
                      HrxOpVxK5d.exeGet hashmaliciousStealc, VidarBrowse
                      • 77.220.212.32
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9633354511054021
                      Encrypted:false
                      SSDEEP:192:Co115QZ0+l1jjucZrP2izuiFJZ24IO8+:B115Q6+l1jjNFzuiFJY4IO8+
                      MD5:5070DA895CFEE2B26746F5EE555B363E
                      SHA1:8AB7AF9655F34E3AF0B111637B26CE2B5C807C88
                      SHA-256:DB70A8F023C82693861396354234825B31301FC8B69B34A272F4A4671836CAA0
                      SHA-512:9EFD04EA7C13666BA7E30EA242F1452AB7FB1ACCFEF31C3E761934F7C901069DB2815865EAA593349C789CDF26B96CDFEBA0CF6905941A125A53ED361A4D17D4
                      Malicious:true
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.7.8.5.6.8.4.6.0.5.7.3.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.7.8.5.6.8.5.1.0.5.7.3.7.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.1.0.2.3.f.3.-.7.5.5.9.-.4.1.1.f.-.8.d.6.c.-.0.e.c.1.f.b.c.d.a.4.6.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.e.2.d.6.9.7.-.c.9.0.e.-.4.8.6.1.-.a.0.0.e.-.2.8.2.9.c.b.e.5.6.8.5.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.5.y.T.E.U.o.j.I.n.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.f.0.-.0.0.0.1.-.0.0.1.4.-.9.5.a.1.-.8.c.d.8.0.f.3.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.5.0.0.2.b.5.b.6.6.7.7.e.7.2.3.f.e.b.3.f.b.9.f.5.6.7.0.5.6.b.5.0.0.0.0.5.6.0.2.!.0.0.0.0.4.5.c.d.3.7.f.3.9.f.e.3.f.9.0.6.f.5.9.3.a.7.c.c.2.b.a.9.d.5.5.e.0.d.3.3.a.0.4.e.!.5.y.T.E.U.o.j.I.n.0...e.x.e.....T.a.r.g.e.t.A.p.p.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Mon Nov 11 08:01:24 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):107074
                      Entropy (8bit):1.7321864234327309
                      Encrypted:false
                      SSDEEP:384:FiCoxJTGKGMIEWJ07MoDPsXk8oogZOmbM7MBDDq5cytFpvP14FT6/:FUZGKGMIEWJ0fPWovOYM7aDDqFpWl6/
                      MD5:4A8FAFCD8016308074545D3F751B0F61
                      SHA1:1D0FB849643032EC0C617C16103B4A91AA7306C3
                      SHA-256:2A32CCE9B750E3BB59E3F88D4C3A0E3AF03FDA8E94BEF729CE38D04830E7B2BE
                      SHA-512:338FDE1D5E49C95774C7989DE5448B233E482C361BB4C9662D0B1535E3C267BCACE462DC158EE8AAAE94BB31DF2B03198695044CD1FA7462A3A1B6CBE0A55FF6
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... ........1g.........................................B..........T.......8...........T............2..jo..........D...........0 ..............................................................................eJ....... ......GenuineIntel............T.............1g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8352
                      Entropy (8bit):3.69537542355749
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJIG6VJT6YSiSU9DP8gmfjqpDM89b5zsfz/zm:R6lXJR6H6YHSU9DP8gmfju5YfzC
                      MD5:0DF9389007B03CD11D7FA6FF1A62BA2F
                      SHA1:49259141ED15BBC74A23A08EE146738BAF8EAB57
                      SHA-256:6A1501E3098AA06FA82893ED6258048F7C32220C55DCFDD7BF0669DFC510A5A7
                      SHA-512:E037F2672121B687F074A28701EF516B60BD1C5AFF114FC4DC306261FAF628932DF6218350EA13BA20FC7F65128391DD077EAD458145ABC9B64A9AA8FD40A33C
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.0.8.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4585
                      Entropy (8bit):4.46844242205174
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zsXJg77aI996WpW8VYqYm8M4JWb2KLeFdV+q8GKk61lA2Agd:uIjf5I7D77VmJDV41q1gd
                      MD5:42642CB4D4D8C1832DA38D1064B69725
                      SHA1:BDBBFEDE18D76FFDFCC0E24BB84583FBEFC48199
                      SHA-256:D0A5AF7F9D0764F4314B6EF5595540565ABD5AC2841619A711161E40CD31CF23
                      SHA-512:92DACB6AF556A8DF0E5C12FDED801FCF721E311939467D9AD94BA392C042EF8F5FD94CE7B914EC376DBA81DC03B094C1B42B843A2DB96269B37FB57AF40D08A1
                      Malicious:false
                      Reputation:low
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="583144" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.372073344563047
                      Encrypted:false
                      SSDEEP:6144:lFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNsiL:DV1QyWWI/glMM6kF7aq
                      MD5:885E05220F305D4D132F021F6EC42FE2
                      SHA1:E0F84B9A8F3A7375BDE7B0B8D8F99A385D8F7E71
                      SHA-256:AC42F4372311CCEC1AAA28D013F575C89B70B4645B3ECE9E22034647E73E62F9
                      SHA-512:BABEDCF7EFD3C456EFA181C9B425A5E5413C8C55535CF93E4A9B68ADF979A5A01113AC2C8982A8C8F618DD9DD51B0C1C0396E078CCB63BFC3D1B38853B64BCDC
                      Malicious:false
                      Reputation:low
                      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..+..4...............................................................................................................................................................................................................................................................................................................................................x<.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):5.62632670883963
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:5yTEUojIn0.exe
                      File size:392'704 bytes
                      MD5:562d1237cff600c083ccafa09d3ce40d
                      SHA1:45cd37f39fe3f906f593a7cc2ba9d55e0d33a04e
                      SHA256:1b1ef9723eb894aae6e3759a352eff67be3057d6619dabc32e4914ca658ac85a
                      SHA512:009a28408002d7003a0b481c6b2e2de383888ed15ed1313a08f23f6b9ed4c80cc7f900df8684a81e15ce1353ed570403ce2128fff27982abd046800b41c6d2d1
                      SSDEEP:6144:EKGyx8r7ZVgqTE3DMcRYo0NCutNPYW5fW:Esmr7tAzg0utNPH
                      TLSH:FB847C4266FD2FA2F6FF4A3D4E3FB2D8262FB5625D28725D1210161F09702E1D5A270B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........P...P...P...N.E.p...N.T.D...N.B.<...wh..Y...P...*...N.K.Q...N.U.Q...N.P.Q...RichP...........................PE..L...P%.d...
                      Icon Hash:738733b183a38be4
                      Entrypoint:0x40186e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x64B72550 [Tue Jul 18 23:50:40 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:9a11732a2e741d4d1a9f61b29552bab4
                      Instruction
                      call 00007F7664E64DCDh
                      jmp 00007F7664E60F0Dh
                      mov edi, edi
                      push ebp
                      mov ebp, esp
                      sub esp, 00000328h
                      mov dword ptr [004378D0h], eax
                      mov dword ptr [004378CCh], ecx
                      mov dword ptr [004378C8h], edx
                      mov dword ptr [004378C4h], ebx
                      mov dword ptr [004378C0h], esi
                      mov dword ptr [004378BCh], edi
                      mov word ptr [004378E8h], ss
                      mov word ptr [004378DCh], cs
                      mov word ptr [004378B8h], ds
                      mov word ptr [004378B4h], es
                      mov word ptr [004378B0h], fs
                      mov word ptr [004378ACh], gs
                      pushfd
                      pop dword ptr [004378E0h]
                      mov eax, dword ptr [ebp+00h]
                      mov dword ptr [004378D4h], eax
                      mov eax, dword ptr [ebp+04h]
                      mov dword ptr [004378D8h], eax
                      lea eax, dword ptr [ebp+08h]
                      mov dword ptr [004378E4h], eax
                      mov eax, dword ptr [ebp-00000320h]
                      mov dword ptr [00437820h], 00010001h
                      mov eax, dword ptr [004378D8h]
                      mov dword ptr [004377D4h], eax
                      mov dword ptr [004377C8h], C0000409h
                      mov dword ptr [004377CCh], 00000001h
                      mov eax, dword ptr [00436008h]
                      mov dword ptr [ebp-00000328h], eax
                      mov eax, dword ptr [0043600Ch]
                      mov dword ptr [ebp-00000324h], eax
                      call dword ptr [000000D4h]
                      Programming Language:
                      • [C++] VS2008 build 21022
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3496c0x50.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x27470000x16848.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x275e0000xa14.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x330000x1b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x31dcc0x31e00fa14f267fec25c984ba711f7a0151db1False0.7432546209273183data7.105156439121909IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x330000x23580x2400ce343ef253f9aaf3c05f18a7927ef238False0.3684895833333333data5.513493888048459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x360000x270f49c0xea00c6e095109377f7790d0b44296379891bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .wizave0x27460000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x27470000x168480x16a00fcc12cb74dec79a6c9fd3bd045313944False0.3881323377071823data4.7118462020383935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x275e0000x5eb00x6000f4fd100afa7c897fe6f68c9b0b846791False0.09488932291666667data1.1387041590142817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x27478700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishPeru0.32062899786780386
                      RT_ICON0x27487180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishPeru0.506768953068592
                      RT_ICON0x2748fc00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishPeru0.5362903225806451
                      RT_ICON0x27496880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishPeru0.5802023121387283
                      RT_ICON0x2749bf00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishPeru0.4220954356846473
                      RT_ICON0x274c1980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishPeru0.49836065573770494
                      RT_ICON0x274cb200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishPeru0.5035460992907801
                      RT_ICON0x274cff00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishPeru0.38326226012793174
                      RT_ICON0x274de980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishPeru0.5302346570397112
                      RT_ICON0x274e7400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishPeru0.6013824884792627
                      RT_ICON0x274ee080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishPeru0.6307803468208093
                      RT_ICON0x274f3700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishPeru0.38860225140712945
                      RT_ICON0x27504180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishPeru0.3823770491803279
                      RT_ICON0x2750da00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishPeru0.42907801418439717
                      RT_ICON0x27512700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishPeru0.279317697228145
                      RT_ICON0x27521180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishPeru0.37364620938628157
                      RT_ICON0x27529c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishPeru0.375
                      RT_ICON0x27530880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishPeru0.37283236994219654
                      RT_ICON0x27535f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishPeru0.2587136929460581
                      RT_ICON0x2755b980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishPeru0.2767354596622889
                      RT_ICON0x2756c400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishPeru0.2872950819672131
                      RT_ICON0x27575c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishPeru0.3280141843971631
                      RT_STRING0x2757c680x408data0.47674418604651164
                      RT_STRING0x27580700x57adata0.43865905848787445
                      RT_STRING0x27585f00x45cdata0.44265232974910396
                      RT_STRING0x2758a500x760data0.4231991525423729
                      RT_STRING0x27591b00x6a6data0.4236192714453584
                      RT_STRING0x27598580x6e4data0.43197278911564624
                      RT_STRING0x2759f400x818data0.4136100386100386
                      RT_STRING0x275a7580x726data0.4262295081967213
                      RT_STRING0x275ae800x826data0.4204218600191755
                      RT_STRING0x275b6a80x6ecdata0.42945823927765236
                      RT_STRING0x275bd980x6cedata0.42824339839265213
                      RT_STRING0x275c4680x796data0.4258496395468589
                      RT_STRING0x275cc000x6dedata0.4300341296928328
                      RT_STRING0x275d2e00x46adata0.45132743362831856
                      RT_STRING0x275d7500xf2data0.5330578512396694
                      RT_ACCELERATOR0x2757aa80x20data1.15625
                      RT_GROUP_ICON0x274cf880x68dataSpanishPeru0.7115384615384616
                      RT_GROUP_ICON0x2757a300x76dataSpanishPeru0.6779661016949152
                      RT_GROUP_ICON0x27512080x68dataSpanishPeru0.7115384615384616
                      RT_VERSION0x2757ac80x1a0data0.5865384615384616
                      DLLImport
                      KERNEL32.dllSetDefaultCommConfigW, GetEnvironmentStringsW, InterlockedCompareExchange, GetModuleHandleW, GetTickCount, GetConsoleAliasesA, GlobalAlloc, LoadLibraryW, GetLocaleInfoW, GetSystemWindowsDirectoryA, GetConsoleAliasExesLengthW, GetStringTypeExW, GetTimeFormatW, GetConsoleAliasW, MulDiv, WriteConsoleW, GetConsoleFontSize, GetVolumePathNameA, GetStartupInfoW, DisconnectNamedPipe, InterlockedExchange, GetStdHandle, MoveFileExA, GetProcAddress, SetFileAttributesA, OpenWaitableTimerA, UnhandledExceptionFilter, MoveFileA, GetProfileStringA, SetThreadIdealProcessor, GlobalHandle, GetModuleFileNameA, GetProcessAffinityMask, BuildCommDCBA, GetShortPathNameW, FindAtomW, FileTimeToLocalFileTime, OpenFileMappingA, GlobalReAlloc, GetLogicalDriveStringsA, WriteConsoleOutputCharacterW, CreateFileA, SetStdHandle, MultiByteToWideChar, Sleep, ExitProcess, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, GetLastError, WriteFile, DeleteCriticalSection, LoadLibraryA, InitializeCriticalSectionAndSpinCount, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, SetHandleCount, GetFileType, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, VirtualAlloc, HeapReAlloc, RtlUnwind, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize, GetConsoleCP, GetConsoleMode, FlushFileBuffers, ReadFile, CloseHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, GetModuleHandleA
                      USER32.dllGetClassLongW, GetMonitorInfoW
                      GDI32.dllGetBoundsRect
                      Language of compilation systemCountry where language is spokenMap
                      SpanishPeru
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-11-11T09:01:18.387196+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.849707TCP
                      2024-11-11T09:01:55.787415+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.849714TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 11, 2024 09:01:03.315681934 CET4970680192.168.2.877.83.175.91
                      Nov 11, 2024 09:01:03.320822001 CET804970677.83.175.91192.168.2.8
                      Nov 11, 2024 09:01:03.320899963 CET4970680192.168.2.877.83.175.91
                      Nov 11, 2024 09:01:03.321024895 CET4970680192.168.2.877.83.175.91
                      Nov 11, 2024 09:01:03.326056957 CET804970677.83.175.91192.168.2.8
                      Nov 11, 2024 09:01:11.660206079 CET804970677.83.175.91192.168.2.8
                      Nov 11, 2024 09:01:11.660305023 CET4970680192.168.2.877.83.175.91
                      Nov 11, 2024 09:01:11.662606001 CET4970680192.168.2.877.83.175.91
                      Nov 11, 2024 09:01:11.667597055 CET804970677.83.175.91192.168.2.8
                      • 77.83.175.91
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.84970677.83.175.91807408C:\Users\user\Desktop\5yTEUojIn0.exe
                      TimestampBytes transferredDirectionData
                      Nov 11, 2024 09:01:03.321024895 CET87OUTGET / HTTP/1.1
                      Host: 77.83.175.91
                      Connection: Keep-Alive
                      Cache-Control: no-cache


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:03:00:59
                      Start date:11/11/2024
                      Path:C:\Users\user\Desktop\5yTEUojIn0.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\5yTEUojIn0.exe"
                      Imagebase:0x400000
                      File size:392'704 bytes
                      MD5 hash:562D1237CFF600C083CCAFA09D3CE40D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1370478954.0000000002D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1652011112.0000000002E17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                      Reputation:low
                      Has exited:true

                      Target ID:6
                      Start time:03:01:24
                      Start date:11/11/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7408 -s 1304
                      Imagebase:0x950000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:5.2%
                        Dynamic/Decrypted Code Coverage:2.2%
                        Signature Coverage:15.9%
                        Total number of Nodes:1273
                        Total number of Limit Nodes:43
                        execution_graph 29571 405640 GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 29572 4056f6 InternetCloseHandle InternetCloseHandle 29571->29572 29576 4056a2 29571->29576 29577 40570e 29572->29577 29573 4056a8 InternetReadFile 29574 4056f3 29573->29574 29573->29576 29574->29572 29575 4056d0 KiUserExceptionDispatcher 29575->29575 29575->29576 29576->29573 29576->29574 29576->29575 29578 404c50 29579 404c70 29578->29579 29580 404c85 29579->29580 29581 404c7d lstrcpy 29579->29581 29732 404bc0 29580->29732 29581->29580 29583 404c90 29584 404ccc lstrcpy 29583->29584 29585 404cd8 29583->29585 29584->29585 29586 404cff lstrcpy 29585->29586 29587 404d0b 29585->29587 29586->29587 29588 404d2f lstrcpy 29587->29588 29589 404d3b 29587->29589 29588->29589 29590 404d6d lstrcpy 29589->29590 29591 404d79 29589->29591 29590->29591 29592 404da0 lstrcpy 29591->29592 29593 404dac InternetOpenA StrCmpCA 29591->29593 29592->29593 29594 404de0 29593->29594 29595 4054b8 InternetCloseHandle CryptStringToBinaryA 29594->29595 29596 404def 29594->29596 29598 4054e8 LocalAlloc 29595->29598 29613 4055d8 29595->29613 29736 423e70 lstrcpy lstrcpy GetSystemTime 29596->29736 29599 4054ff CryptStringToBinaryA 29598->29599 29598->29613 29600 405517 LocalFree 29599->29600 29601 405529 lstrlenA 29599->29601 29600->29613 29602 40553d 29601->29602 29604 405563 lstrlenA 29602->29604 29605 405557 lstrcpy 29602->29605 29603 404dfa 29606 404e23 lstrcpy lstrcatA 29603->29606 29607 404e38 29603->29607 29609 40557d 29604->29609 29605->29604 29606->29607 29608 404e5a lstrcpy 29607->29608 29610 404e62 29607->29610 29608->29610 29611 40558f lstrcpy lstrcatA 29609->29611 29612 4055a2 29609->29612 29614 404e71 lstrlenA 29610->29614 29611->29612 29615 4055d1 29612->29615 29617 4055c9 lstrcpy 29612->29617 29616 404e89 29614->29616 29615->29613 29618 404e95 lstrcpy lstrcatA 29616->29618 29619 404eac 29616->29619 29617->29615 29618->29619 29620 404ed5 29619->29620 29621 404ecd lstrcpy 29619->29621 29622 404edc lstrlenA 29620->29622 29621->29620 29623 404ef2 29622->29623 29624 404efe lstrcpy lstrcatA 29623->29624 29625 404f15 29623->29625 29624->29625 29626 404f36 lstrcpy 29625->29626 29627 404f3e 29625->29627 29626->29627 29628 404f65 lstrcpy lstrcatA 29627->29628 29629 404f7b 29627->29629 29628->29629 29630 404fa4 29629->29630 29631 404f9c lstrcpy 29629->29631 29632 404fab lstrlenA 29630->29632 29631->29630 29633 404fc1 29632->29633 29634 404fcd lstrcpy lstrcatA 29633->29634 29635 404fe4 29633->29635 29634->29635 29636 40500d 29635->29636 29637 405005 lstrcpy 29635->29637 29638 405014 lstrlenA 29636->29638 29637->29636 29639 40502a 29638->29639 29640 405036 lstrcpy lstrcatA 29639->29640 29641 40504d 29639->29641 29640->29641 29642 405079 29641->29642 29643 405071 lstrcpy 29641->29643 29644 405080 lstrlenA 29642->29644 29643->29642 29645 40509b 29644->29645 29646 4050ac lstrcpy lstrcatA 29645->29646 29647 4050bc 29645->29647 29646->29647 29648 4050da lstrcpy lstrcatA 29647->29648 29649 4050ed 29647->29649 29648->29649 29650 40510b lstrcpy 29649->29650 29651 405113 29649->29651 29650->29651 29652 405121 InternetConnectA 29651->29652 29652->29595 29653 405150 HttpOpenRequestA 29652->29653 29654 4054b1 InternetCloseHandle 29653->29654 29655 40518b 29653->29655 29654->29595 29737 427310 lstrlenA lstrcpy lstrcatA 29655->29737 29657 40519b 29738 427280 lstrcpy 29657->29738 29659 4051a4 29739 4272c0 lstrcpy lstrcatA 29659->29739 29661 4051b7 29740 427280 lstrcpy 29661->29740 29663 4051c0 29741 427310 lstrlenA lstrcpy lstrcatA 29663->29741 29665 4051d5 29742 427280 lstrcpy 29665->29742 29667 4051de 29743 427310 lstrlenA lstrcpy lstrcatA 29667->29743 29669 4051f4 29744 427280 lstrcpy 29669->29744 29671 4051fd 29745 427310 lstrlenA lstrcpy lstrcatA 29671->29745 29673 405213 29746 427280 lstrcpy 29673->29746 29675 40521c 29747 427310 lstrlenA lstrcpy lstrcatA 29675->29747 29677 405231 29748 427280 lstrcpy 29677->29748 29679 40523a 29749 4272c0 lstrcpy lstrcatA 29679->29749 29681 40524d 29750 427280 lstrcpy 29681->29750 29683 405256 29751 427310 lstrlenA lstrcpy lstrcatA 29683->29751 29685 40526b 29752 427280 lstrcpy 29685->29752 29687 405274 29753 427310 lstrlenA lstrcpy lstrcatA 29687->29753 29689 405289 29754 427280 lstrcpy 29689->29754 29691 405292 29755 4272c0 lstrcpy lstrcatA 29691->29755 29693 4052a5 29756 427280 lstrcpy 29693->29756 29695 4052ae 29757 427310 lstrlenA lstrcpy lstrcatA 29695->29757 29697 4052c3 29758 427280 lstrcpy 29697->29758 29699 4052cc 29759 427310 lstrlenA lstrcpy lstrcatA 29699->29759 29701 4052e2 29760 427280 lstrcpy 29701->29760 29703 4052eb 29761 427310 lstrlenA lstrcpy lstrcatA 29703->29761 29705 405301 29762 427280 lstrcpy 29705->29762 29707 40530a 29763 427310 lstrlenA lstrcpy lstrcatA 29707->29763 29709 40531f 29764 427280 lstrcpy 29709->29764 29711 405328 29765 4272c0 lstrcpy lstrcatA 29711->29765 29713 40533b 29766 427280 lstrcpy 29713->29766 29715 405344 29716 405370 lstrcpy 29715->29716 29717 40537c 29715->29717 29716->29717 29767 4272c0 lstrcpy lstrcatA 29717->29767 29719 40538a 29768 4272c0 lstrcpy lstrcatA 29719->29768 29721 405397 29769 427280 lstrcpy 29721->29769 29723 4053a1 29724 4053b1 lstrlenA lstrlenA HttpSendRequestA InternetReadFile 29723->29724 29725 40549c InternetCloseHandle 29724->29725 29729 4053f2 29724->29729 29727 4054ae 29725->29727 29726 4053fd lstrlenA 29726->29729 29727->29654 29728 40542e lstrcpy lstrcatA 29728->29729 29729->29725 29729->29726 29729->29728 29730 40546b lstrcpy 29729->29730 29731 40547a InternetReadFile 29729->29731 29730->29729 29731->29725 29731->29729 29733 404bd0 29732->29733 29733->29733 29734 404bd7 ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI lstrlenA InternetCrackUrlA 29733->29734 29735 404c41 29734->29735 29735->29583 29736->29603 29737->29657 29738->29659 29739->29661 29740->29663 29741->29665 29742->29667 29743->29669 29744->29671 29745->29673 29746->29675 29747->29677 29748->29679 29749->29681 29750->29683 29751->29685 29752->29687 29753->29689 29754->29691 29755->29693 29756->29695 29757->29697 29758->29699 29759->29701 29760->29703 29761->29705 29762->29707 29763->29709 29764->29711 29765->29713 29766->29715 29767->29719 29768->29721 29769->29723 29770 402e70 30403 404a60 17 API calls 29770->30403 29772 402e82 29773 404a60 34 API calls 29772->29773 29774 402ea0 29773->29774 29775 404a60 34 API calls 29774->29775 29776 402eb6 29775->29776 29777 404a60 34 API calls 29776->29777 29778 402ecb 29777->29778 29779 404a60 34 API calls 29778->29779 29780 402eec 29779->29780 29781 404a60 34 API calls 29780->29781 29782 402f01 29781->29782 29783 404a60 34 API calls 29782->29783 29784 402f19 29783->29784 29785 404a60 34 API calls 29784->29785 29786 402f3a 29785->29786 29787 404a60 34 API calls 29786->29787 29788 402f4f 29787->29788 29789 404a60 34 API calls 29788->29789 29790 402f65 29789->29790 29791 404a60 34 API calls 29790->29791 29792 402f7b 29791->29792 29793 404a60 34 API calls 29792->29793 29794 402f91 29793->29794 29795 404a60 34 API calls 29794->29795 29796 402faa 29795->29796 29797 404a60 34 API calls 29796->29797 29798 402fc0 29797->29798 29799 404a60 34 API calls 29798->29799 29800 402fd6 29799->29800 29801 404a60 34 API calls 29800->29801 29802 402fec 29801->29802 29803 404a60 34 API calls 29802->29803 29804 403002 29803->29804 29805 404a60 34 API calls 29804->29805 29806 403018 29805->29806 29807 404a60 34 API calls 29806->29807 29808 403031 29807->29808 29809 404a60 34 API calls 29808->29809 29810 403047 29809->29810 29811 404a60 34 API calls 29810->29811 29812 40305d 29811->29812 29813 404a60 34 API calls 29812->29813 29814 403073 29813->29814 29815 404a60 34 API calls 29814->29815 29816 403089 29815->29816 29817 404a60 34 API calls 29816->29817 29818 40309f 29817->29818 29819 404a60 34 API calls 29818->29819 29820 4030b8 29819->29820 29821 404a60 34 API calls 29820->29821 29822 4030ce 29821->29822 29823 404a60 34 API calls 29822->29823 29824 4030e4 29823->29824 29825 404a60 34 API calls 29824->29825 29826 4030fa 29825->29826 29827 404a60 34 API calls 29826->29827 29828 403110 29827->29828 29829 404a60 34 API calls 29828->29829 29830 403126 29829->29830 29831 404a60 34 API calls 29830->29831 29832 40313f 29831->29832 29833 404a60 34 API calls 29832->29833 29834 403155 29833->29834 29835 404a60 34 API calls 29834->29835 29836 40316b 29835->29836 29837 404a60 34 API calls 29836->29837 29838 403181 29837->29838 29839 404a60 34 API calls 29838->29839 29840 403197 29839->29840 29841 404a60 34 API calls 29840->29841 29842 4031ad 29841->29842 29843 404a60 34 API calls 29842->29843 29844 4031c6 29843->29844 29845 404a60 34 API calls 29844->29845 29846 4031dc 29845->29846 29847 404a60 34 API calls 29846->29847 29848 4031f2 29847->29848 29849 404a60 34 API calls 29848->29849 29850 403208 29849->29850 29851 404a60 34 API calls 29850->29851 29852 40321e 29851->29852 29853 404a60 34 API calls 29852->29853 29854 403234 29853->29854 29855 404a60 34 API calls 29854->29855 29856 40324d 29855->29856 29857 404a60 34 API calls 29856->29857 29858 403263 29857->29858 29859 404a60 34 API calls 29858->29859 29860 403279 29859->29860 29861 404a60 34 API calls 29860->29861 29862 40328f 29861->29862 29863 404a60 34 API calls 29862->29863 29864 4032a5 29863->29864 29865 404a60 34 API calls 29864->29865 29866 4032bb 29865->29866 29867 404a60 34 API calls 29866->29867 29868 4032d4 29867->29868 29869 404a60 34 API calls 29868->29869 29870 4032ea 29869->29870 29871 404a60 34 API calls 29870->29871 29872 403300 29871->29872 29873 404a60 34 API calls 29872->29873 29874 403316 29873->29874 29875 404a60 34 API calls 29874->29875 29876 40332c 29875->29876 29877 404a60 34 API calls 29876->29877 29878 403342 29877->29878 29879 404a60 34 API calls 29878->29879 29880 40335b 29879->29880 29881 404a60 34 API calls 29880->29881 29882 403371 29881->29882 29883 404a60 34 API calls 29882->29883 29884 403387 29883->29884 29885 404a60 34 API calls 29884->29885 29886 40339d 29885->29886 29887 404a60 34 API calls 29886->29887 29888 4033b3 29887->29888 29889 404a60 34 API calls 29888->29889 29890 4033c9 29889->29890 29891 404a60 34 API calls 29890->29891 29892 4033e2 29891->29892 29893 404a60 34 API calls 29892->29893 29894 4033f8 29893->29894 29895 404a60 34 API calls 29894->29895 29896 40340e 29895->29896 29897 404a60 34 API calls 29896->29897 29898 403424 29897->29898 29899 404a60 34 API calls 29898->29899 29900 40343a 29899->29900 29901 404a60 34 API calls 29900->29901 29902 403450 29901->29902 29903 404a60 34 API calls 29902->29903 29904 403469 29903->29904 29905 404a60 34 API calls 29904->29905 29906 40347f 29905->29906 29907 404a60 34 API calls 29906->29907 29908 403495 29907->29908 29909 404a60 34 API calls 29908->29909 29910 4034ab 29909->29910 29911 404a60 34 API calls 29910->29911 29912 4034c1 29911->29912 29913 404a60 34 API calls 29912->29913 29914 4034d7 29913->29914 29915 404a60 34 API calls 29914->29915 29916 4034f0 29915->29916 29917 404a60 34 API calls 29916->29917 29918 403506 29917->29918 29919 404a60 34 API calls 29918->29919 29920 40351c 29919->29920 29921 404a60 34 API calls 29920->29921 29922 403532 29921->29922 29923 404a60 34 API calls 29922->29923 29924 403548 29923->29924 29925 404a60 34 API calls 29924->29925 29926 40355e 29925->29926 29927 404a60 34 API calls 29926->29927 29928 403577 29927->29928 29929 404a60 34 API calls 29928->29929 29930 40358d 29929->29930 29931 404a60 34 API calls 29930->29931 29932 4035a3 29931->29932 29933 404a60 34 API calls 29932->29933 29934 4035b9 29933->29934 29935 404a60 34 API calls 29934->29935 29936 4035cf 29935->29936 29937 404a60 34 API calls 29936->29937 29938 4035e5 29937->29938 29939 404a60 34 API calls 29938->29939 29940 4035fe 29939->29940 29941 404a60 34 API calls 29940->29941 29942 403614 29941->29942 29943 404a60 34 API calls 29942->29943 29944 40362a 29943->29944 29945 404a60 34 API calls 29944->29945 29946 403640 29945->29946 29947 404a60 34 API calls 29946->29947 29948 403656 29947->29948 29949 404a60 34 API calls 29948->29949 29950 40366c 29949->29950 29951 404a60 34 API calls 29950->29951 29952 403685 29951->29952 29953 404a60 34 API calls 29952->29953 29954 40369b 29953->29954 29955 404a60 34 API calls 29954->29955 29956 4036b1 29955->29956 29957 404a60 34 API calls 29956->29957 29958 4036c7 29957->29958 29959 404a60 34 API calls 29958->29959 29960 4036dd 29959->29960 29961 404a60 34 API calls 29960->29961 29962 4036f3 29961->29962 29963 404a60 34 API calls 29962->29963 29964 40370c 29963->29964 29965 404a60 34 API calls 29964->29965 29966 403722 29965->29966 29967 404a60 34 API calls 29966->29967 29968 403738 29967->29968 29969 404a60 34 API calls 29968->29969 29970 40374e 29969->29970 29971 404a60 34 API calls 29970->29971 29972 403764 29971->29972 29973 404a60 34 API calls 29972->29973 29974 40377a 29973->29974 29975 404a60 34 API calls 29974->29975 29976 403793 29975->29976 29977 404a60 34 API calls 29976->29977 29978 4037a9 29977->29978 29979 404a60 34 API calls 29978->29979 29980 4037bf 29979->29980 29981 404a60 34 API calls 29980->29981 29982 4037d5 29981->29982 29983 404a60 34 API calls 29982->29983 29984 4037eb 29983->29984 29985 404a60 34 API calls 29984->29985 29986 403801 29985->29986 29987 404a60 34 API calls 29986->29987 29988 40381a 29987->29988 29989 404a60 34 API calls 29988->29989 29990 403830 29989->29990 29991 404a60 34 API calls 29990->29991 29992 403846 29991->29992 29993 404a60 34 API calls 29992->29993 29994 40385c 29993->29994 29995 404a60 34 API calls 29994->29995 29996 403872 29995->29996 29997 404a60 34 API calls 29996->29997 29998 403888 29997->29998 29999 404a60 34 API calls 29998->29999 30000 4038a1 29999->30000 30001 404a60 34 API calls 30000->30001 30002 4038b7 30001->30002 30003 404a60 34 API calls 30002->30003 30004 4038cd 30003->30004 30005 404a60 34 API calls 30004->30005 30006 4038e3 30005->30006 30007 404a60 34 API calls 30006->30007 30008 4038f9 30007->30008 30009 404a60 34 API calls 30008->30009 30010 40390f 30009->30010 30011 404a60 34 API calls 30010->30011 30012 403928 30011->30012 30013 404a60 34 API calls 30012->30013 30014 40393e 30013->30014 30015 404a60 34 API calls 30014->30015 30016 403954 30015->30016 30017 404a60 34 API calls 30016->30017 30018 40396a 30017->30018 30019 404a60 34 API calls 30018->30019 30020 403980 30019->30020 30021 404a60 34 API calls 30020->30021 30022 403996 30021->30022 30023 404a60 34 API calls 30022->30023 30024 4039af 30023->30024 30025 404a60 34 API calls 30024->30025 30026 4039c5 30025->30026 30027 404a60 34 API calls 30026->30027 30028 4039db 30027->30028 30029 404a60 34 API calls 30028->30029 30030 4039f1 30029->30030 30031 404a60 34 API calls 30030->30031 30032 403a07 30031->30032 30033 404a60 34 API calls 30032->30033 30034 403a1d 30033->30034 30035 404a60 34 API calls 30034->30035 30036 403a36 30035->30036 30037 404a60 34 API calls 30036->30037 30038 403a4c 30037->30038 30039 404a60 34 API calls 30038->30039 30040 403a62 30039->30040 30041 404a60 34 API calls 30040->30041 30042 403a78 30041->30042 30043 404a60 34 API calls 30042->30043 30044 403a8e 30043->30044 30045 404a60 34 API calls 30044->30045 30046 403aa4 30045->30046 30047 404a60 34 API calls 30046->30047 30048 403abd 30047->30048 30049 404a60 34 API calls 30048->30049 30050 403ad3 30049->30050 30051 404a60 34 API calls 30050->30051 30052 403ae9 30051->30052 30053 404a60 34 API calls 30052->30053 30054 403aff 30053->30054 30055 404a60 34 API calls 30054->30055 30056 403b15 30055->30056 30057 404a60 34 API calls 30056->30057 30058 403b2b 30057->30058 30059 404a60 34 API calls 30058->30059 30060 403b44 30059->30060 30061 404a60 34 API calls 30060->30061 30062 403b5a 30061->30062 30063 404a60 34 API calls 30062->30063 30064 403b70 30063->30064 30065 404a60 34 API calls 30064->30065 30066 403b86 30065->30066 30067 404a60 34 API calls 30066->30067 30068 403b9c 30067->30068 30069 404a60 34 API calls 30068->30069 30070 403bb2 30069->30070 30071 404a60 34 API calls 30070->30071 30072 403bcb 30071->30072 30073 404a60 34 API calls 30072->30073 30074 403be1 30073->30074 30075 404a60 34 API calls 30074->30075 30076 403bf7 30075->30076 30077 404a60 34 API calls 30076->30077 30078 403c0d 30077->30078 30079 404a60 34 API calls 30078->30079 30080 403c23 30079->30080 30081 404a60 34 API calls 30080->30081 30082 403c39 30081->30082 30083 404a60 34 API calls 30082->30083 30084 403c52 30083->30084 30085 404a60 34 API calls 30084->30085 30086 403c68 30085->30086 30087 404a60 34 API calls 30086->30087 30088 403c7e 30087->30088 30089 404a60 34 API calls 30088->30089 30090 403c94 30089->30090 30091 404a60 34 API calls 30090->30091 30092 403caa 30091->30092 30093 404a60 34 API calls 30092->30093 30094 403cc0 30093->30094 30095 404a60 34 API calls 30094->30095 30096 403cd9 30095->30096 30097 404a60 34 API calls 30096->30097 30098 403cef 30097->30098 30099 404a60 34 API calls 30098->30099 30100 403d05 30099->30100 30101 404a60 34 API calls 30100->30101 30102 403d1b 30101->30102 30103 404a60 34 API calls 30102->30103 30104 403d31 30103->30104 30105 404a60 34 API calls 30104->30105 30106 403d47 30105->30106 30107 404a60 34 API calls 30106->30107 30108 403d60 30107->30108 30109 404a60 34 API calls 30108->30109 30110 403d76 30109->30110 30111 404a60 34 API calls 30110->30111 30112 403d8c 30111->30112 30113 404a60 34 API calls 30112->30113 30114 403da2 30113->30114 30115 404a60 34 API calls 30114->30115 30116 403db8 30115->30116 30117 404a60 34 API calls 30116->30117 30118 403dce 30117->30118 30119 404a60 34 API calls 30118->30119 30120 403de7 30119->30120 30121 404a60 34 API calls 30120->30121 30122 403dfd 30121->30122 30123 404a60 34 API calls 30122->30123 30124 403e13 30123->30124 30125 404a60 34 API calls 30124->30125 30126 403e29 30125->30126 30127 404a60 34 API calls 30126->30127 30128 403e3f 30127->30128 30129 404a60 34 API calls 30128->30129 30130 403e55 30129->30130 30131 404a60 34 API calls 30130->30131 30132 403e6e 30131->30132 30133 404a60 34 API calls 30132->30133 30134 403e84 30133->30134 30135 404a60 34 API calls 30134->30135 30136 403e9a 30135->30136 30137 404a60 34 API calls 30136->30137 30138 403eb0 30137->30138 30139 404a60 34 API calls 30138->30139 30140 403ec6 30139->30140 30141 404a60 34 API calls 30140->30141 30142 403edc 30141->30142 30143 404a60 34 API calls 30142->30143 30144 403ef5 30143->30144 30145 404a60 34 API calls 30144->30145 30146 403f0b 30145->30146 30147 404a60 34 API calls 30146->30147 30148 403f21 30147->30148 30149 404a60 34 API calls 30148->30149 30150 403f37 30149->30150 30151 404a60 34 API calls 30150->30151 30152 403f4d 30151->30152 30153 404a60 34 API calls 30152->30153 30154 403f63 30153->30154 30155 404a60 34 API calls 30154->30155 30156 403f7c 30155->30156 30157 404a60 34 API calls 30156->30157 30158 403f92 30157->30158 30159 404a60 34 API calls 30158->30159 30160 403fa8 30159->30160 30161 404a60 34 API calls 30160->30161 30162 403fbe 30161->30162 30163 404a60 34 API calls 30162->30163 30164 403fd4 30163->30164 30165 404a60 34 API calls 30164->30165 30166 403fea 30165->30166 30167 404a60 34 API calls 30166->30167 30168 404003 30167->30168 30169 404a60 34 API calls 30168->30169 30170 404019 30169->30170 30171 404a60 34 API calls 30170->30171 30172 40402f 30171->30172 30173 404a60 34 API calls 30172->30173 30174 404045 30173->30174 30175 404a60 34 API calls 30174->30175 30176 40405b 30175->30176 30177 404a60 34 API calls 30176->30177 30178 404071 30177->30178 30179 404a60 34 API calls 30178->30179 30180 40408a 30179->30180 30181 404a60 34 API calls 30180->30181 30182 4040a0 30181->30182 30183 404a60 34 API calls 30182->30183 30184 4040b6 30183->30184 30185 404a60 34 API calls 30184->30185 30186 4040cc 30185->30186 30187 404a60 34 API calls 30186->30187 30188 4040e2 30187->30188 30189 404a60 34 API calls 30188->30189 30190 4040f8 30189->30190 30191 404a60 34 API calls 30190->30191 30192 404111 30191->30192 30193 404a60 34 API calls 30192->30193 30194 404127 30193->30194 30195 404a60 34 API calls 30194->30195 30196 40413d 30195->30196 30197 404a60 34 API calls 30196->30197 30198 404153 30197->30198 30199 404a60 34 API calls 30198->30199 30200 404169 30199->30200 30201 404a60 34 API calls 30200->30201 30202 40417f 30201->30202 30203 404a60 34 API calls 30202->30203 30204 404198 30203->30204 30205 404a60 34 API calls 30204->30205 30206 4041ae 30205->30206 30207 404a60 34 API calls 30206->30207 30208 4041c4 30207->30208 30209 404a60 34 API calls 30208->30209 30210 4041da 30209->30210 30211 404a60 34 API calls 30210->30211 30212 4041f0 30211->30212 30213 404a60 34 API calls 30212->30213 30214 404206 30213->30214 30215 404a60 34 API calls 30214->30215 30216 40421f 30215->30216 30217 404a60 34 API calls 30216->30217 30218 404235 30217->30218 30219 404a60 34 API calls 30218->30219 30220 40424b 30219->30220 30221 404a60 34 API calls 30220->30221 30222 404261 30221->30222 30223 404a60 34 API calls 30222->30223 30224 404277 30223->30224 30225 404a60 34 API calls 30224->30225 30226 40428d 30225->30226 30227 404a60 34 API calls 30226->30227 30228 4042a6 30227->30228 30229 404a60 34 API calls 30228->30229 30230 4042bc 30229->30230 30231 404a60 34 API calls 30230->30231 30232 4042d2 30231->30232 30233 404a60 34 API calls 30232->30233 30234 4042e8 30233->30234 30235 404a60 34 API calls 30234->30235 30236 4042fe 30235->30236 30237 404a60 34 API calls 30236->30237 30238 404314 30237->30238 30239 404a60 34 API calls 30238->30239 30240 40432d 30239->30240 30241 404a60 34 API calls 30240->30241 30242 404343 30241->30242 30243 404a60 34 API calls 30242->30243 30244 404359 30243->30244 30245 404a60 34 API calls 30244->30245 30246 40436f 30245->30246 30247 404a60 34 API calls 30246->30247 30248 404385 30247->30248 30249 404a60 34 API calls 30248->30249 30250 40439b 30249->30250 30251 404a60 34 API calls 30250->30251 30252 4043b4 30251->30252 30253 404a60 34 API calls 30252->30253 30254 4043ca 30253->30254 30255 404a60 34 API calls 30254->30255 30256 4043e0 30255->30256 30257 404a60 34 API calls 30256->30257 30258 4043f6 30257->30258 30259 404a60 34 API calls 30258->30259 30260 40440c 30259->30260 30261 404a60 34 API calls 30260->30261 30262 404422 30261->30262 30263 404a60 34 API calls 30262->30263 30264 40443b 30263->30264 30265 404a60 34 API calls 30264->30265 30266 404451 30265->30266 30267 404a60 34 API calls 30266->30267 30268 404467 30267->30268 30269 404a60 34 API calls 30268->30269 30270 40447d 30269->30270 30271 404a60 34 API calls 30270->30271 30272 404493 30271->30272 30273 404a60 34 API calls 30272->30273 30274 4044a9 30273->30274 30275 404a60 34 API calls 30274->30275 30276 4044c2 30275->30276 30277 404a60 34 API calls 30276->30277 30278 4044d8 30277->30278 30279 404a60 34 API calls 30278->30279 30280 4044ee 30279->30280 30281 404a60 34 API calls 30280->30281 30282 404504 30281->30282 30283 404a60 34 API calls 30282->30283 30284 40451a 30283->30284 30285 404a60 34 API calls 30284->30285 30286 404530 30285->30286 30287 404a60 34 API calls 30286->30287 30288 404549 30287->30288 30289 404a60 34 API calls 30288->30289 30290 40455f 30289->30290 30291 404a60 34 API calls 30290->30291 30292 404575 30291->30292 30293 404a60 34 API calls 30292->30293 30294 40458b 30293->30294 30295 404a60 34 API calls 30294->30295 30296 4045a1 30295->30296 30297 404a60 34 API calls 30296->30297 30298 4045b7 30297->30298 30299 404a60 34 API calls 30298->30299 30300 4045d0 30299->30300 30301 404a60 34 API calls 30300->30301 30302 4045e6 30301->30302 30303 404a60 34 API calls 30302->30303 30304 4045fc 30303->30304 30305 404a60 34 API calls 30304->30305 30306 404612 30305->30306 30307 404a60 34 API calls 30306->30307 30308 404628 30307->30308 30309 404a60 34 API calls 30308->30309 30310 40463e 30309->30310 30311 404a60 34 API calls 30310->30311 30312 404657 30311->30312 30313 404a60 34 API calls 30312->30313 30314 40466d 30313->30314 30315 404a60 34 API calls 30314->30315 30316 404683 30315->30316 30317 404a60 34 API calls 30316->30317 30318 404699 30317->30318 30319 404a60 34 API calls 30318->30319 30320 4046af 30319->30320 30321 404a60 34 API calls 30320->30321 30322 4046c5 30321->30322 30323 404a60 34 API calls 30322->30323 30324 4046de 30323->30324 30325 404a60 34 API calls 30324->30325 30326 4046f4 30325->30326 30327 404a60 34 API calls 30326->30327 30328 40470a 30327->30328 30329 404a60 34 API calls 30328->30329 30330 404720 30329->30330 30331 404a60 34 API calls 30330->30331 30332 404736 30331->30332 30333 404a60 34 API calls 30332->30333 30334 40474c 30333->30334 30335 404a60 34 API calls 30334->30335 30336 404765 30335->30336 30337 404a60 34 API calls 30336->30337 30338 40477b 30337->30338 30339 404a60 34 API calls 30338->30339 30340 404791 30339->30340 30341 404a60 34 API calls 30340->30341 30342 4047a7 30341->30342 30343 404a60 34 API calls 30342->30343 30344 4047bd 30343->30344 30345 404a60 34 API calls 30344->30345 30346 4047d3 30345->30346 30347 404a60 34 API calls 30346->30347 30348 4047ec 30347->30348 30349 404a60 34 API calls 30348->30349 30350 404802 30349->30350 30351 404a60 34 API calls 30350->30351 30352 404818 30351->30352 30353 404a60 34 API calls 30352->30353 30354 40482e 30353->30354 30355 404a60 34 API calls 30354->30355 30356 404844 30355->30356 30357 404a60 34 API calls 30356->30357 30358 40485a 30357->30358 30359 404a60 34 API calls 30358->30359 30360 404873 30359->30360 30361 404a60 34 API calls 30360->30361 30362 404889 30361->30362 30363 404a60 34 API calls 30362->30363 30364 40489f 30363->30364 30365 404a60 34 API calls 30364->30365 30366 4048b5 30365->30366 30367 404a60 34 API calls 30366->30367 30368 4048cb 30367->30368 30369 404a60 34 API calls 30368->30369 30370 4048e1 30369->30370 30371 404a60 34 API calls 30370->30371 30372 4048fa 30371->30372 30373 404a60 34 API calls 30372->30373 30374 404910 30373->30374 30375 404a60 34 API calls 30374->30375 30376 404926 30375->30376 30377 404a60 34 API calls 30376->30377 30378 40493c 30377->30378 30379 404a60 34 API calls 30378->30379 30380 404952 30379->30380 30381 404a60 34 API calls 30380->30381 30382 404968 30381->30382 30383 404a60 34 API calls 30382->30383 30384 404981 30383->30384 30385 404a60 34 API calls 30384->30385 30386 404997 30385->30386 30387 404a60 34 API calls 30386->30387 30388 4049ad 30387->30388 30389 404a60 34 API calls 30388->30389 30390 4049c3 30389->30390 30391 404a60 34 API calls 30390->30391 30392 4049d9 30391->30392 30393 404a60 34 API calls 30392->30393 30394 4049ef 30393->30394 30395 404a60 34 API calls 30394->30395 30396 404a08 30395->30396 30397 404a60 34 API calls 30396->30397 30398 404a1e 30397->30398 30399 404a60 34 API calls 30398->30399 30400 404a34 30399->30400 30401 404a60 34 API calls 30400->30401 30402 404a4a 30401->30402 30404 404b7a 6 API calls 30403->30404 30405 404afe 30403->30405 30404->29772 30406 404b06 11 API calls 30405->30406 30406->30404 30406->30406 30407 41ede0 30408 41ee00 30407->30408 30409 41ee18 30408->30409 30410 41ee10 lstrcpy 30408->30410 30415 401530 30409->30415 30410->30409 30414 41ee2e 30574 401610 30415->30574 30417 40153b 30418 401555 lstrcpy 30417->30418 30419 40155d 30417->30419 30418->30419 30420 401577 lstrcpy 30419->30420 30421 40157f 30419->30421 30420->30421 30422 401599 lstrcpy 30421->30422 30424 4015a1 30421->30424 30422->30424 30423 401605 30426 405790 30423->30426 30424->30423 30425 4015fd lstrcpy 30424->30425 30425->30423 30427 4057b0 30426->30427 30428 4057c5 30427->30428 30429 4057bd lstrcpy 30427->30429 30430 404bc0 5 API calls 30428->30430 30429->30428 30431 4057d0 30430->30431 30584 4240b0 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 30431->30584 30433 405806 lstrlenA 30585 4240b0 CryptBinaryToStringA GetProcessHeap HeapAlloc CryptBinaryToStringA 30433->30585 30435 405825 30436 40584e lstrcpy 30435->30436 30437 40585a 30435->30437 30436->30437 30438 40588d lstrcpy 30437->30438 30439 405899 30437->30439 30438->30439 30440 4058bd lstrcpy 30439->30440 30441 4058c9 30439->30441 30440->30441 30442 4058f2 lstrcpy 30441->30442 30443 4058fe 30441->30443 30442->30443 30444 405938 InternetOpenA StrCmpCA 30443->30444 30445 40592c lstrcpy 30443->30445 30446 40596c 30444->30446 30445->30444 30447 406004 InternetCloseHandle 30446->30447 30586 423e70 lstrcpy lstrcpy GetSystemTime 30446->30586 30466 40603a 30447->30466 30449 405986 30450 4059ae lstrcpy lstrcatA 30449->30450 30451 4059c3 30449->30451 30450->30451 30452 4059e2 lstrcpy 30451->30452 30453 4059ea 30451->30453 30452->30453 30454 4059f9 lstrlenA 30453->30454 30455 405a11 30454->30455 30456 405a1e lstrcpy lstrcatA 30455->30456 30457 405a32 30455->30457 30456->30457 30458 405a5f lstrlenA 30457->30458 30460 405a4c lstrcpy lstrcatA 30457->30460 30459 405a75 30458->30459 30461 405a7f lstrcpy lstrcatA 30459->30461 30462 405a93 30459->30462 30460->30458 30461->30462 30463 405ab2 lstrcpy 30462->30463 30464 405aba 30462->30464 30463->30464 30465 405acf lstrlenA 30464->30465 30467 405aea 30465->30467 30466->30414 30468 405afb lstrcpy lstrcatA 30467->30468 30469 405b0b 30467->30469 30468->30469 30470 405b29 lstrcpy lstrcatA 30469->30470 30471 405b3c 30469->30471 30470->30471 30472 405b5a lstrcpy 30471->30472 30473 405b62 30471->30473 30472->30473 30474 405b70 InternetConnectA 30473->30474 30475 405ffe 30474->30475 30476 405b9f HttpOpenRequestA 30474->30476 30475->30447 30477 405ff7 InternetCloseHandle 30476->30477 30478 405bdb 30476->30478 30477->30475 30587 427310 lstrlenA lstrcpy lstrcatA 30478->30587 30480 405beb 30588 427280 lstrcpy 30480->30588 30482 405bf4 30589 4272c0 lstrcpy lstrcatA 30482->30589 30484 405c07 30590 427280 lstrcpy 30484->30590 30486 405c10 30591 427310 lstrlenA lstrcpy lstrcatA 30486->30591 30488 405c25 30592 427280 lstrcpy 30488->30592 30490 405c2e 30593 427310 lstrlenA lstrcpy lstrcatA 30490->30593 30492 405c44 30594 427280 lstrcpy 30492->30594 30494 405c4d 30595 427310 lstrlenA lstrcpy lstrcatA 30494->30595 30496 405c63 30596 427280 lstrcpy 30496->30596 30498 405c6c 30597 427310 lstrlenA lstrcpy lstrcatA 30498->30597 30500 405c81 30598 427280 lstrcpy 30500->30598 30502 405c8a 30599 4272c0 lstrcpy lstrcatA 30502->30599 30504 405c9d 30600 427280 lstrcpy 30504->30600 30506 405ca6 30601 427310 lstrlenA lstrcpy lstrcatA 30506->30601 30508 405cbb 30602 427280 lstrcpy 30508->30602 30510 405cc4 30603 427310 lstrlenA lstrcpy lstrcatA 30510->30603 30512 405cd9 30604 427280 lstrcpy 30512->30604 30514 405ce2 30605 4272c0 lstrcpy lstrcatA 30514->30605 30516 405cf5 30606 427280 lstrcpy 30516->30606 30518 405cfe 30607 427310 lstrlenA lstrcpy lstrcatA 30518->30607 30520 405d13 30608 427280 lstrcpy 30520->30608 30522 405d1c 30609 427310 lstrlenA lstrcpy lstrcatA 30522->30609 30524 405d32 30610 427280 lstrcpy 30524->30610 30526 405d3b 30611 427310 lstrlenA lstrcpy lstrcatA 30526->30611 30528 405d51 30612 427280 lstrcpy 30528->30612 30530 405d5a 30613 427310 lstrlenA lstrcpy lstrcatA 30530->30613 30532 405d6f 30614 427280 lstrcpy 30532->30614 30534 405d78 30615 427310 lstrlenA lstrcpy lstrcatA 30534->30615 30536 405d8b 30616 427280 lstrcpy 30536->30616 30538 405d94 30617 427310 lstrlenA lstrcpy lstrcatA 30538->30617 30540 405da9 30618 427280 lstrcpy 30540->30618 30542 405db2 30619 427310 lstrlenA lstrcpy lstrcatA 30542->30619 30544 405dc7 30620 427280 lstrcpy 30544->30620 30546 405dd0 30621 4272c0 lstrcpy lstrcatA 30546->30621 30548 405de3 30622 427280 lstrcpy 30548->30622 30550 405dec 30623 427310 lstrlenA lstrcpy lstrcatA 30550->30623 30552 405e01 30624 427280 lstrcpy 30552->30624 30554 405e0a 30625 427310 lstrlenA lstrcpy lstrcatA 30554->30625 30556 405e20 30626 427280 lstrcpy 30556->30626 30558 405e29 30627 427310 lstrlenA lstrcpy lstrcatA 30558->30627 30560 405e3f 30628 427280 lstrcpy 30560->30628 30562 405e48 30629 427310 lstrlenA lstrcpy lstrcatA 30562->30629 30564 405e5d 30630 427280 lstrcpy 30564->30630 30566 405e66 30567 405e6e 14 API calls 30566->30567 30568 405fea InternetCloseHandle 30567->30568 30571 405f3a 30567->30571 30568->30477 30569 405f4b lstrlenA 30569->30571 30570 405f7c lstrcpy lstrcatA 30570->30571 30571->30568 30571->30569 30571->30570 30572 405fb9 lstrcpy 30571->30572 30573 405fc8 InternetReadFile 30571->30573 30572->30571 30573->30568 30573->30571 30575 40161f 30574->30575 30576 40162b lstrcpy 30575->30576 30577 401633 30575->30577 30576->30577 30578 40164d lstrcpy 30577->30578 30579 401655 30577->30579 30578->30579 30580 40166f lstrcpy 30579->30580 30582 401677 30579->30582 30580->30582 30581 401699 30581->30417 30582->30581 30583 401691 lstrcpy 30582->30583 30583->30581 30584->30433 30585->30435 30586->30449 30587->30480 30588->30482 30589->30484 30590->30486 30591->30488 30592->30490 30593->30492 30594->30494 30595->30496 30596->30498 30597->30500 30598->30502 30599->30504 30600->30506 30601->30508 30602->30510 30603->30512 30604->30514 30605->30516 30606->30518 30607->30520 30608->30522 30609->30524 30610->30526 30611->30528 30612->30530 30613->30532 30614->30534 30615->30536 30616->30538 30617->30540 30618->30542 30619->30544 30620->30546 30621->30548 30622->30550 30623->30552 30624->30554 30625->30556 30626->30558 30627->30560 30628->30562 30629->30564 30630->30566 30631 2df98ae 30632 2df98bd 30631->30632 30635 2dfa04e 30632->30635 30641 2dfa069 30635->30641 30636 2dfa072 CreateToolhelp32Snapshot 30637 2dfa08e Module32First 30636->30637 30636->30641 30638 2dfa09d 30637->30638 30639 2df98c6 30637->30639 30642 2df9d0d 30638->30642 30641->30636 30641->30637 30643 2df9d38 30642->30643 30644 2df9d49 VirtualAlloc 30643->30644 30645 2df9d81 30643->30645 30644->30645 30646 41f1b0 lstrlenA 30647 41f1e4 30646->30647 30648 41f1f7 lstrlenA 30647->30648 30649 41f1eb lstrcpy 30647->30649 30650 41f208 30648->30650 30649->30648 30651 41f21b lstrlenA 30650->30651 30652 41f20f lstrcpy 30650->30652 30653 41f22c 30651->30653 30652->30651 30654 41f233 lstrcpy 30653->30654 30655 41f23f 30653->30655 30654->30655 30656 41f258 lstrcpy 30655->30656 30657 41f264 30655->30657 30656->30657 30658 41f286 lstrcpy 30657->30658 30659 41f292 30657->30659 30658->30659 30660 41f2ba lstrcpy 30659->30660 30661 41f2c6 30659->30661 30660->30661 30662 41f2ea lstrcpy 30661->30662 30713 41f300 30661->30713 30662->30713 30663 41f30c lstrlenA 30663->30713 30664 41f4b9 lstrcpy 30664->30713 30665 41f3a1 lstrcpy 30665->30713 30666 41f3c5 lstrcpy 30666->30713 30667 41f4e8 lstrcpy 30727 41f4f0 30667->30727 30668 41f479 lstrcpy 30668->30713 30669 41f70f StrCmpCA 30675 41fe8e 30669->30675 30669->30713 30670 41f616 StrCmpCA 30670->30669 30670->30727 30671 41f59c lstrcpy 30671->30727 30672 41fa29 StrCmpCA 30684 41fe2b 30672->30684 30672->30713 30673 41f73e lstrlenA 30673->30713 30674 41fd4d StrCmpCA 30678 41fd60 Sleep 30674->30678 30689 41fd75 30674->30689 30676 41fead lstrlenA 30675->30676 30677 41fea5 lstrcpy 30675->30677 30682 41fec7 30676->30682 30677->30676 30678->30713 30679 41fa58 lstrlenA 30679->30713 30680 41f64a lstrcpy 30680->30727 30681 401530 8 API calls 30681->30727 30687 41fee7 lstrlenA 30682->30687 30692 41fedf lstrcpy 30682->30692 30683 41fe4a lstrlenA 30691 41fe64 30683->30691 30684->30683 30685 41fe42 lstrcpy 30684->30685 30685->30683 30686 41f89e lstrcpy 30686->30713 30695 41ff01 30687->30695 30688 41fd94 lstrlenA 30704 41fdae 30688->30704 30689->30688 30693 41fd8c lstrcpy 30689->30693 30690 41f76f lstrcpy 30690->30713 30697 41fdce lstrlenA 30691->30697 30699 41fe7c lstrcpy 30691->30699 30692->30687 30693->30688 30694 41fbb8 lstrcpy 30694->30713 30703 41ff21 30695->30703 30708 41ff19 lstrcpy 30695->30708 30696 41fa89 lstrcpy 30696->30713 30707 41fde8 30697->30707 30698 41f8cd lstrcpy 30698->30727 30699->30697 30700 41f791 lstrcpy 30700->30713 30702 401530 8 API calls 30702->30713 30709 401610 4 API calls 30703->30709 30704->30697 30712 41fdc6 lstrcpy 30704->30712 30705 41ee90 28 API calls 30705->30713 30706 41fbe7 lstrcpy 30706->30727 30714 41fe08 30707->30714 30716 41fe00 lstrcpy 30707->30716 30708->30703 30730 41fe13 30709->30730 30710 41faab lstrcpy 30710->30713 30711 41f698 lstrcpy 30711->30727 30712->30697 30713->30663 30713->30664 30713->30665 30713->30666 30713->30667 30713->30668 30713->30669 30713->30672 30713->30673 30713->30674 30713->30679 30713->30686 30713->30690 30713->30694 30713->30696 30713->30698 30713->30700 30713->30702 30713->30705 30713->30706 30713->30710 30718 41f7e2 lstrcpy 30713->30718 30721 41fafc lstrcpy 30713->30721 30713->30727 30717 401610 4 API calls 30714->30717 30715 41efb0 36 API calls 30715->30727 30716->30714 30717->30730 30718->30713 30719 41f924 lstrcpy 30719->30727 30720 41f99e StrCmpCA 30720->30672 30720->30727 30721->30713 30722 41fc3e lstrcpy 30722->30727 30723 41fcb8 StrCmpCA 30723->30674 30723->30727 30724 41f9cb lstrcpy 30724->30727 30725 41fce9 lstrcpy 30725->30727 30726 41ee90 28 API calls 30726->30727 30727->30670 30727->30671 30727->30672 30727->30674 30727->30680 30727->30681 30727->30711 30727->30713 30727->30715 30727->30719 30727->30720 30727->30722 30727->30723 30727->30724 30727->30725 30727->30726 30728 41fa19 lstrcpy 30727->30728 30729 41fd3a lstrcpy 30727->30729 30728->30727 30729->30727 30731 422880 GetProcessHeap HeapAlloc 30738 422910 GetProcessHeap HeapAlloc RegOpenKeyExA 30731->30738 30733 4228a9 30734 4228b0 30733->30734 30735 4228ba RegOpenKeyExA 30733->30735 30736 4228f2 RegCloseKey 30735->30736 30737 4228db RegQueryValueExA 30735->30737 30737->30736 30739 422955 RegQueryValueExA 30738->30739 30740 42296b RegCloseKey 30738->30740 30739->30740 30741 422980 30740->30741 30741->30733 30741->30741 30742 422740 GetWindowsDirectoryA 30743 422785 30742->30743 30744 42278c GetVolumeInformationA 30742->30744 30743->30744 30745 4227ec GetProcessHeap HeapAlloc 30744->30745 30747 422822 30745->30747 30748 422826 wsprintfA 30745->30748 30751 4271e0 lstrcpy 30747->30751 30748->30747 30750 422860 30751->30750 30752 4266e0 30753 426afe 8 API calls 30752->30753 30754 4266ed 43 API calls 30752->30754 30755 426b94 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30753->30755 30756 426c08 30753->30756 30754->30753 30755->30756 30757 426cd2 30756->30757 30758 426c15 8 API calls 30756->30758 30759 426cdb GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30757->30759 30760 426d4f 30757->30760 30758->30757 30759->30760 30761 426de9 30760->30761 30762 426d5c 6 API calls 30760->30762 30763 426f10 30761->30763 30764 426df6 12 API calls 30761->30764 30762->30761 30765 426f19 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30763->30765 30766 426f8d 30763->30766 30764->30763 30765->30766 30767 426fc1 30766->30767 30768 426f96 GetProcAddress GetProcAddress 30766->30768 30769 426ff5 30767->30769 30770 426fca GetProcAddress GetProcAddress 30767->30770 30768->30767 30771 427002 10 API calls 30769->30771 30772 4270ed 30769->30772 30770->30769 30771->30772 30773 427152 30772->30773 30774 4270f6 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30772->30774 30775 42715b GetProcAddress 30773->30775 30776 42716e 30773->30776 30774->30773 30775->30776 30777 4271d3 30776->30777 30778 427177 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30776->30778 30778->30777 30779 421bf0 30809 402a90 30779->30809 30783 421c03 30784 421c6d GetSystemInfo 30783->30784 30785 421c85 30784->30785 30910 401030 GetCurrentProcess VirtualAllocExNuma 30785->30910 30790 421cb8 30922 422ad0 GetProcessHeap HeapAlloc GetComputerNameA 30790->30922 30792 421cbd 30793 421ce7 lstrlenA 30792->30793 30794 421cff 30793->30794 30795 421d23 lstrlenA 30794->30795 30796 421d39 30795->30796 30797 422ad0 3 API calls 30796->30797 30798 421d5f lstrlenA 30797->30798 30799 421d74 30798->30799 30800 421d9a lstrlenA 30799->30800 30801 421db0 30800->30801 30924 422a40 GetProcessHeap HeapAlloc GetUserNameA 30801->30924 30803 421dd3 lstrlenA 30804 421de7 30803->30804 30805 421e56 OpenEventA 30804->30805 30806 421e8c CreateEventA 30805->30806 30925 421b20 GetSystemTime 30806->30925 30808 421ea0 30810 404a60 34 API calls 30809->30810 30811 402aa1 30810->30811 30812 404a60 34 API calls 30811->30812 30813 402ab7 30812->30813 30814 404a60 34 API calls 30813->30814 30815 402acd 30814->30815 30816 404a60 34 API calls 30815->30816 30817 402ae3 30816->30817 30818 404a60 34 API calls 30817->30818 30819 402af9 30818->30819 30820 404a60 34 API calls 30819->30820 30821 402b0f 30820->30821 30822 404a60 34 API calls 30821->30822 30823 402b28 30822->30823 30824 404a60 34 API calls 30823->30824 30825 402b3e 30824->30825 30826 404a60 34 API calls 30825->30826 30827 402b54 30826->30827 30828 404a60 34 API calls 30827->30828 30829 402b6a 30828->30829 30830 404a60 34 API calls 30829->30830 30831 402b80 30830->30831 30832 404a60 34 API calls 30831->30832 30833 402b96 30832->30833 30834 404a60 34 API calls 30833->30834 30835 402baf 30834->30835 30836 404a60 34 API calls 30835->30836 30837 402bc5 30836->30837 30838 404a60 34 API calls 30837->30838 30839 402bdb 30838->30839 30840 404a60 34 API calls 30839->30840 30841 402bf1 30840->30841 30842 404a60 34 API calls 30841->30842 30843 402c07 30842->30843 30844 404a60 34 API calls 30843->30844 30845 402c1d 30844->30845 30846 404a60 34 API calls 30845->30846 30847 402c36 30846->30847 30848 404a60 34 API calls 30847->30848 30849 402c4c 30848->30849 30850 404a60 34 API calls 30849->30850 30851 402c62 30850->30851 30852 404a60 34 API calls 30851->30852 30853 402c78 30852->30853 30854 404a60 34 API calls 30853->30854 30855 402c8e 30854->30855 30856 404a60 34 API calls 30855->30856 30857 402ca4 30856->30857 30858 404a60 34 API calls 30857->30858 30859 402cbd 30858->30859 30860 404a60 34 API calls 30859->30860 30861 402cd3 30860->30861 30862 404a60 34 API calls 30861->30862 30863 402ce9 30862->30863 30864 404a60 34 API calls 30863->30864 30865 402cff 30864->30865 30866 404a60 34 API calls 30865->30866 30867 402d15 30866->30867 30868 404a60 34 API calls 30867->30868 30869 402d2b 30868->30869 30870 404a60 34 API calls 30869->30870 30871 402d44 30870->30871 30872 404a60 34 API calls 30871->30872 30873 402d5a 30872->30873 30874 404a60 34 API calls 30873->30874 30875 402d70 30874->30875 30876 404a60 34 API calls 30875->30876 30877 402d86 30876->30877 30878 404a60 34 API calls 30877->30878 30879 402d9c 30878->30879 30880 404a60 34 API calls 30879->30880 30881 402db2 30880->30881 30882 404a60 34 API calls 30881->30882 30883 402dcb 30882->30883 30884 404a60 34 API calls 30883->30884 30885 402de1 30884->30885 30886 404a60 34 API calls 30885->30886 30887 402df7 30886->30887 30888 404a60 34 API calls 30887->30888 30889 402e0d 30888->30889 30890 404a60 34 API calls 30889->30890 30891 402e23 30890->30891 30892 404a60 34 API calls 30891->30892 30893 402e39 30892->30893 30894 404a60 34 API calls 30893->30894 30895 402e52 30894->30895 30896 426390 GetPEB 30895->30896 30897 4265c3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 30896->30897 30898 4263c3 30896->30898 30899 426625 GetProcAddress 30897->30899 30900 426638 30897->30900 30907 4263d7 20 API calls 30898->30907 30899->30900 30901 426641 GetProcAddress GetProcAddress 30900->30901 30902 42666c 30900->30902 30901->30902 30903 426675 GetProcAddress 30902->30903 30904 426688 30902->30904 30903->30904 30905 426691 GetProcAddress 30904->30905 30906 4266a4 30904->30906 30905->30906 30908 4266d7 30906->30908 30909 4266ad GetProcAddress GetProcAddress 30906->30909 30907->30897 30908->30783 30909->30908 30911 401057 ExitProcess 30910->30911 30912 40105e VirtualAlloc 30910->30912 30913 40107d 30912->30913 30914 4010b1 30913->30914 30915 40108a VirtualFree 30913->30915 30916 4010c0 30914->30916 30915->30914 30917 4010d0 GlobalMemoryStatusEx 30916->30917 30919 401112 ExitProcess 30917->30919 30920 4010f5 30917->30920 30920->30919 30921 40111a GetUserDefaultLangID 30920->30921 30921->30790 30923 422b24 30922->30923 30923->30792 30924->30803 30933 421820 25 API calls 30925->30933 30927 421b81 sscanf 30934 402a20 30927->30934 30930 421bd6 30931 421be9 30930->30931 30932 421be2 ExitProcess 30930->30932 30931->30808 30933->30927 30935 402a24 SystemTimeToFileTime SystemTimeToFileTime 30934->30935 30935->30930 30935->30931 30936 2d0003c 30937 2d00049 30936->30937 30951 2d00e0f SetErrorMode SetErrorMode 30937->30951 30942 2d00265 30943 2d002ce VirtualProtect 30942->30943 30945 2d0030b 30943->30945 30944 2d00439 VirtualFree 30949 2d005f4 LoadLibraryA 30944->30949 30950 2d004be 30944->30950 30945->30944 30946 2d004e3 LoadLibraryA 30946->30950 30948 2d008c7 30949->30948 30950->30946 30950->30949 30952 2d00223 30951->30952 30953 2d00d90 30952->30953 30954 2d00dad 30953->30954 30955 2d00dbb GetPEB 30954->30955 30956 2d00238 VirtualAlloc 30954->30956 30955->30956 30956->30942

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 633 4266e0-4266e7 634 426afe-426b92 LoadLibraryA * 8 633->634 635 4266ed-426af9 GetProcAddress * 43 633->635 636 426b94-426c03 GetProcAddress * 5 634->636 637 426c08-426c0f 634->637 635->634 636->637 638 426cd2-426cd9 637->638 639 426c15-426ccd GetProcAddress * 8 637->639 640 426cdb-426d4a GetProcAddress * 5 638->640 641 426d4f-426d56 638->641 639->638 640->641 642 426de9-426df0 641->642 643 426d5c-426de4 GetProcAddress * 6 641->643 644 426f10-426f17 642->644 645 426df6-426f0b GetProcAddress * 12 642->645 643->642 646 426f19-426f88 GetProcAddress * 5 644->646 647 426f8d-426f94 644->647 645->644 646->647 648 426fc1-426fc8 647->648 649 426f96-426fbc GetProcAddress * 2 647->649 650 426ff5-426ffc 648->650 651 426fca-426ff0 GetProcAddress * 2 648->651 649->648 652 427002-4270e8 GetProcAddress * 10 650->652 653 4270ed-4270f4 650->653 651->650 652->653 654 427152-427159 653->654 655 4270f6-42714d GetProcAddress * 4 653->655 656 42715b-427169 GetProcAddress 654->656 657 42716e-427175 654->657 655->654 656->657 658 4271d3 657->658 659 427177-4271ce GetProcAddress * 4 657->659 659->658
                        APIs
                        • GetProcAddress.KERNEL32(75550000,02DF2860), ref: 004266F5
                        • GetProcAddress.KERNEL32(75550000,02DF2580), ref: 0042670D
                        • GetProcAddress.KERNEL32(75550000,02E17328), ref: 00426726
                        • GetProcAddress.KERNEL32(75550000,02E17340), ref: 0042673E
                        • GetProcAddress.KERNEL32(75550000,02E17388), ref: 00426756
                        • GetProcAddress.KERNEL32(75550000,02E17310), ref: 0042676F
                        • GetProcAddress.KERNEL32(75550000,02E19B30), ref: 00426787
                        • GetProcAddress.KERNEL32(75550000,02E173B8), ref: 0042679F
                        • GetProcAddress.KERNEL32(75550000,02E173D0), ref: 004267B8
                        • GetProcAddress.KERNEL32(75550000,02E17370), ref: 004267D0
                        • GetProcAddress.KERNEL32(75550000,02E1DCD8), ref: 004267E8
                        • GetProcAddress.KERNEL32(75550000,02DF2640), ref: 00426801
                        • GetProcAddress.KERNEL32(75550000,02DF28A0), ref: 00426819
                        • GetProcAddress.KERNEL32(75550000,02DF2760), ref: 00426831
                        • GetProcAddress.KERNEL32(75550000,02DF26E0), ref: 0042684A
                        • GetProcAddress.KERNEL32(75550000,02E1DBD0), ref: 00426862
                        • GetProcAddress.KERNEL32(75550000,02E1DD50), ref: 0042687A
                        • GetProcAddress.KERNEL32(75550000,02E19900), ref: 00426893
                        • GetProcAddress.KERNEL32(75550000,02DF24E0), ref: 004268AB
                        • GetProcAddress.KERNEL32(75550000,02E1DC18), ref: 004268C3
                        • GetProcAddress.KERNEL32(75550000,02E1DCF0), ref: 004268DC
                        • GetProcAddress.KERNEL32(75550000,02E1DD80), ref: 004268F4
                        • GetProcAddress.KERNEL32(75550000,02E1DE70), ref: 0042690C
                        • GetProcAddress.KERNEL32(75550000,02DF2500), ref: 00426925
                        • GetProcAddress.KERNEL32(75550000,02E1DC90), ref: 0042693D
                        • GetProcAddress.KERNEL32(75550000,02E1DC48), ref: 00426955
                        • GetProcAddress.KERNEL32(75550000,02E1DDF8), ref: 0042696E
                        • GetProcAddress.KERNEL32(75550000,02E1DCA8), ref: 00426986
                        • GetProcAddress.KERNEL32(75550000,02E1DD08), ref: 0042699E
                        • GetProcAddress.KERNEL32(75550000,02E1DD38), ref: 004269B7
                        • GetProcAddress.KERNEL32(75550000,02E1DD20), ref: 004269CF
                        • GetProcAddress.KERNEL32(75550000,02E1DEA0), ref: 004269E7
                        • GetProcAddress.KERNEL32(75550000,02E1DD68), ref: 00426A00
                        • GetProcAddress.KERNEL32(75550000,02E196F0), ref: 00426A18
                        • GetProcAddress.KERNEL32(75550000,02E1DBE8), ref: 00426A30
                        • GetProcAddress.KERNEL32(75550000,02E1DE10), ref: 00426A49
                        • GetProcAddress.KERNEL32(75550000,02DF25A0), ref: 00426A61
                        • GetProcAddress.KERNEL32(75550000,02E1DE58), ref: 00426A79
                        • GetProcAddress.KERNEL32(75550000,02DF27A0), ref: 00426A92
                        • GetProcAddress.KERNEL32(75550000,02E1DC78), ref: 00426AAA
                        • GetProcAddress.KERNEL32(75550000,02E1DDB0), ref: 00426AC2
                        • GetProcAddress.KERNEL32(75550000,02DF2520), ref: 00426ADB
                        • GetProcAddress.KERNEL32(75550000,02DF2540), ref: 00426AF3
                        • LoadLibraryA.KERNEL32(02E1DDE0,0042051F,?,00421EA5), ref: 00426B05
                        • LoadLibraryA.KERNEL32(02E1DC30,?,00421EA5), ref: 00426B16
                        • LoadLibraryA.KERNEL32(02E1DE28,?,00421EA5), ref: 00426B28
                        • LoadLibraryA.KERNEL32(02E1DDC8,?,00421EA5), ref: 00426B3A
                        • LoadLibraryA.KERNEL32(02E1DCC0,?,00421EA5), ref: 00426B4B
                        • LoadLibraryA.KERNEL32(02E1DC60,?,00421EA5), ref: 00426B5D
                        • LoadLibraryA.KERNEL32(02E1DD98,?,00421EA5), ref: 00426B6F
                        • LoadLibraryA.KERNEL32(02E1DE40,?,00421EA5), ref: 00426B80
                        • GetProcAddress.KERNEL32(75750000,02DF25C0), ref: 00426B9C
                        • GetProcAddress.KERNEL32(75750000,02E1DE88), ref: 00426BB4
                        • GetProcAddress.KERNEL32(75750000,02E17678), ref: 00426BCD
                        • GetProcAddress.KERNEL32(75750000,02E1DC00), ref: 00426BE5
                        • GetProcAddress.KERNEL32(75750000,02DF2980), ref: 00426BFD
                        • GetProcAddress.KERNEL32(73CC0000,02E19A40), ref: 00426C1D
                        • GetProcAddress.KERNEL32(73CC0000,02DF2AE0), ref: 00426C35
                        • GetProcAddress.KERNEL32(73CC0000,02E19BA8), ref: 00426C4E
                        • GetProcAddress.KERNEL32(73CC0000,02E1DEB8), ref: 00426C66
                        • GetProcAddress.KERNEL32(73CC0000,02E1DF18), ref: 00426C7E
                        • GetProcAddress.KERNEL32(73CC0000,02DF2A60), ref: 00426C97
                        • GetProcAddress.KERNEL32(73CC0000,02DF2BE0), ref: 00426CAF
                        • GetProcAddress.KERNEL32(73CC0000,02E1DF78), ref: 00426CC7
                        • GetProcAddress.KERNEL32(757E0000,02DF2AC0), ref: 00426CE3
                        • GetProcAddress.KERNEL32(757E0000,02DF2C00), ref: 00426CFB
                        • GetProcAddress.KERNEL32(757E0000,02E1DF60), ref: 00426D14
                        • GetProcAddress.KERNEL32(757E0000,02E1DF48), ref: 00426D2C
                        • GetProcAddress.KERNEL32(757E0000,02DF2A00), ref: 00426D44
                        • GetProcAddress.KERNEL32(758D0000,02E19978), ref: 00426D64
                        • GetProcAddress.KERNEL32(758D0000,02E19C48), ref: 00426D7C
                        • GetProcAddress.KERNEL32(758D0000,02E1DF90), ref: 00426D95
                        • GetProcAddress.KERNEL32(758D0000,02DF2C40), ref: 00426DAD
                        • GetProcAddress.KERNEL32(758D0000,02DF2BA0), ref: 00426DC5
                        • GetProcAddress.KERNEL32(758D0000,02E19928), ref: 00426DDE
                        • GetProcAddress.KERNEL32(76BE0000,02E1DED0), ref: 00426DFE
                        • GetProcAddress.KERNEL32(76BE0000,02DF2BC0), ref: 00426E16
                        • GetProcAddress.KERNEL32(76BE0000,02E177C8), ref: 00426E2F
                        • GetProcAddress.KERNEL32(76BE0000,02E1DEE8), ref: 00426E47
                        • GetProcAddress.KERNEL32(76BE0000,02E1DF00), ref: 00426E5F
                        • GetProcAddress.KERNEL32(76BE0000,02DF2C20), ref: 00426E78
                        • GetProcAddress.KERNEL32(76BE0000,02DF2C60), ref: 00426E90
                        • GetProcAddress.KERNEL32(76BE0000,02E1DF30), ref: 00426EA8
                        • GetProcAddress.KERNEL32(76BE0000,02E1DFD8), ref: 00426EC1
                        • GetProcAddress.KERNEL32(76BE0000,CreateDesktopA), ref: 00426ED7
                        • GetProcAddress.KERNEL32(76BE0000,OpenDesktopA), ref: 00426EEE
                        • GetProcAddress.KERNEL32(76BE0000,CloseDesktop), ref: 00426F05
                        • GetProcAddress.KERNEL32(75670000,02DF2A40), ref: 00426F21
                        • GetProcAddress.KERNEL32(75670000,02E1E0C8), ref: 00426F39
                        • GetProcAddress.KERNEL32(75670000,02E1E248), ref: 00426F52
                        • GetProcAddress.KERNEL32(75670000,02E1E170), ref: 00426F6A
                        • GetProcAddress.KERNEL32(75670000,02E1E0E0), ref: 00426F82
                        • GetProcAddress.KERNEL32(759D0000,02DF28E0), ref: 00426F9E
                        • GetProcAddress.KERNEL32(759D0000,02DF2B00), ref: 00426FB6
                        • GetProcAddress.KERNEL32(76D80000,02DF29A0), ref: 00426FD2
                        • GetProcAddress.KERNEL32(76D80000,02E1E200), ref: 00426FEA
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2960), ref: 0042700A
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2A80), ref: 00427022
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2B20), ref: 0042703B
                        • GetProcAddress.KERNEL32(6F5C0000,02E1E278), ref: 00427053
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2900), ref: 0042706B
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2A20), ref: 00427084
                        • GetProcAddress.KERNEL32(6F5C0000,02DF29C0), ref: 0042709C
                        • GetProcAddress.KERNEL32(6F5C0000,02DF2C80), ref: 004270B4
                        • GetProcAddress.KERNEL32(6F5C0000,InternetSetOptionA), ref: 004270CB
                        • GetProcAddress.KERNEL32(6F5C0000,HttpQueryInfoA), ref: 004270E2
                        • GetProcAddress.KERNEL32(75480000,02E1E0B0), ref: 004270FE
                        • GetProcAddress.KERNEL32(75480000,02E17748), ref: 00427116
                        • GetProcAddress.KERNEL32(75480000,02E1E140), ref: 0042712F
                        • GetProcAddress.KERNEL32(75480000,02E1E0F8), ref: 00427147
                        • GetProcAddress.KERNEL32(753B0000,02DF2920), ref: 00427163
                        • GetProcAddress.KERNEL32(6D660000,02E1E110), ref: 0042717F
                        • GetProcAddress.KERNEL32(6D660000,02DF2B40), ref: 00427197
                        • GetProcAddress.KERNEL32(6D660000,02E1DFF0), ref: 004271B0
                        • GetProcAddress.KERNEL32(6D660000,02E1E218), ref: 004271C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: CloseDesktop$CreateDesktopA$HttpQueryInfoA$InternetSetOptionA$OpenDesktopA$P2Wu$1Wu
                        • API String ID: 2238633743-1673689602
                        • Opcode ID: 8a0bdfc08fccdd3cba7c5a7ed546d60d1095bcb3ca406ab1f60ec5b9cf0af696
                        • Instruction ID: 24e69b76aff6c9b7150681862aeee9ecdced478a12f1b503b046a4f57b6f05f2
                        • Opcode Fuzzy Hash: 8a0bdfc08fccdd3cba7c5a7ed546d60d1095bcb3ca406ab1f60ec5b9cf0af696
                        • Instruction Fuzzy Hash: 18625EB9A103009FD758DF65ED88AA637BBF789345310A91DF95683364DBB4A800DFB0
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 00404C7F
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00404CD2
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00404D05
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00404D35
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00404D73
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00404DA6
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404DB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$InternetOpen
                        • String ID: "$------
                        • API String ID: 2041821634-2370822465
                        • Opcode ID: 14802837412dab40ccde9c16937c2f05542ed3580c852b768cfde8aaca49ba56
                        • Instruction ID: afea9254e350e2c83c5ca1416078c05f3deafe074f832828c9fbfb0ea130657c
                        • Opcode Fuzzy Hash: 14802837412dab40ccde9c16937c2f05542ed3580c852b768cfde8aaca49ba56
                        • Instruction Fuzzy Hash: D3527C71A006169BDB21EBA5DC89A9F77B9AF44304F14502AF901B7291DB78EC41CFE8

                        Control-flow Graph

                        APIs
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A74
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A7B
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A82
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A89
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404A90
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
                        • RtlAllocateHeap.NTDLL(00000000), ref: 00404AA2
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AB2
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AB9
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AC0
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AC7
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404ACE
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AD9
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AE0
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AE7
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AEE
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404AF5
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B0B
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B12
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B19
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B20
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B27
                        • strlen.MSVCRT ref: 00404B2F
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B53
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B5A
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B61
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B68
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B6F
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B7F
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B86
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B8D
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B94
                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404B9B
                        • VirtualProtect.KERNEL32(00000000,00000004,00000100,?), ref: 00404BB0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                        • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                        • API String ID: 2127927946-3329630956
                        • Opcode ID: 045d89fccd1938906dd098eb9d538f982648d72d25a4e93490e98aa75e76be42
                        • Instruction ID: 85cb4657458729044da74830f500108033980542ca90528f5ca988eecffe09e6
                        • Opcode Fuzzy Hash: 045d89fccd1938906dd098eb9d538f982648d72d25a4e93490e98aa75e76be42
                        • Instruction Fuzzy Hash: 1D31E5A8B40218768620EBFB4C4BB9F7E54DFCC750F215093751857180C9B96681CBEA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1780 426390-4263bd GetPEB 1781 4265c3-426623 LoadLibraryA * 5 1780->1781 1782 4263c3-4265be call 4262f0 GetProcAddress * 20 1780->1782 1783 426625-426633 GetProcAddress 1781->1783 1784 426638-42663f 1781->1784 1782->1781 1783->1784 1786 426641-426667 GetProcAddress * 2 1784->1786 1787 42666c-426673 1784->1787 1786->1787 1789 426675-426683 GetProcAddress 1787->1789 1790 426688-42668f 1787->1790 1789->1790 1791 426691-42669f GetProcAddress 1790->1791 1792 4266a4-4266ab 1790->1792 1791->1792 1794 4266d7-4266da 1792->1794 1795 4266ad-4266d2 GetProcAddress * 2 1792->1795 1795->1794
                        APIs
                        • GetProcAddress.KERNEL32(75550000,02DF8BF8), ref: 004263E9
                        • GetProcAddress.KERNEL32(75550000,02DF8C70), ref: 00426402
                        • GetProcAddress.KERNEL32(75550000,02DF8BE0), ref: 0042641A
                        • GetProcAddress.KERNEL32(75550000,02DF8C10), ref: 00426432
                        • GetProcAddress.KERNEL32(75550000,02DF4130), ref: 0042644B
                        • GetProcAddress.KERNEL32(75550000,02DF2720), ref: 00426463
                        • GetProcAddress.KERNEL32(75550000,02DF2560), ref: 0042647B
                        • GetProcAddress.KERNEL32(75550000,02DF8C28), ref: 00426494
                        • GetProcAddress.KERNEL32(75550000,02E17148), ref: 004264AC
                        • GetProcAddress.KERNEL32(75550000,02E171C0), ref: 004264C4
                        • GetProcAddress.KERNEL32(75550000,02E17028), ref: 004264DD
                        • GetProcAddress.KERNEL32(75550000,02DF27C0), ref: 004264F5
                        • GetProcAddress.KERNEL32(75550000,02E17058), ref: 0042650D
                        • GetProcAddress.KERNEL32(75550000,02E17118), ref: 00426526
                        • GetProcAddress.KERNEL32(75550000,02DF2740), ref: 0042653E
                        • GetProcAddress.KERNEL32(75550000,02E172B0), ref: 00426556
                        • GetProcAddress.KERNEL32(75550000,02E17040), ref: 0042656F
                        • GetProcAddress.KERNEL32(75550000,02DF25E0), ref: 00426587
                        • GetProcAddress.KERNEL32(75550000,02E17088), ref: 0042659F
                        • GetProcAddress.KERNEL32(75550000,02DF27E0), ref: 004265B8
                        • LoadLibraryA.KERNEL32(02E170E8,?,?,?,00421C03), ref: 004265C9
                        • LoadLibraryA.KERNEL32(02E17130,?,?,?,00421C03), ref: 004265DB
                        • LoadLibraryA.KERNEL32(02E17178,?,?,?,00421C03), ref: 004265ED
                        • LoadLibraryA.KERNEL32(02E17160,?,?,?,00421C03), ref: 004265FE
                        • LoadLibraryA.KERNEL32(02E172E0,?,?,?,00421C03), ref: 00426610
                        • GetProcAddress.KERNEL32(75670000,02E17190), ref: 0042662D
                        • GetProcAddress.KERNEL32(75750000,02E171A8), ref: 00426649
                        • GetProcAddress.KERNEL32(75750000,02E17100), ref: 00426661
                        • GetProcAddress.KERNEL32(76BE0000,02E17280), ref: 0042667D
                        • GetProcAddress.KERNEL32(759D0000,02DF2620), ref: 00426699
                        • GetProcAddress.KERNEL32(773F0000,02DF4140), ref: 004266B5
                        • GetProcAddress.KERNEL32(773F0000,NtQueryInformationProcess), ref: 004266CC
                        Strings
                        • NtQueryInformationProcess, xrefs: 004266C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: NtQueryInformationProcess
                        • API String ID: 2238633743-2781105232
                        • Opcode ID: 08423d41d42870b35824142912b907ad99356ee077fbccda2de61b0a00986185
                        • Instruction ID: 56f15a9ebe07009b104d3bca99d0accdf766ba62d45a378873afb81fcff78c7b
                        • Opcode Fuzzy Hash: 08423d41d42870b35824142912b907ad99356ee077fbccda2de61b0a00986185
                        • Instruction Fuzzy Hash: 0FA16EB9A117009FD758DF65EE88A6637BBF789744300A51DF94683360DBB4A900DFB0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1883 406c40-406c64 call 402930 1886 406c75-406c97 call 404bc0 1883->1886 1887 406c66-406c6b 1883->1887 1891 406c99 1886->1891 1892 406caa-406cba call 402930 1886->1892 1887->1886 1888 406c6d-406c6f lstrcpy 1887->1888 1888->1886 1893 406ca0-406ca8 1891->1893 1896 406cc8-406cf5 InternetOpenA StrCmpCA 1892->1896 1897 406cbc-406cc2 lstrcpy 1892->1897 1893->1892 1893->1893 1898 406cf7 1896->1898 1899 406cfa-406cfc 1896->1899 1897->1896 1898->1899 1900 406d02-406d22 InternetConnectA 1899->1900 1901 406ea8-406ebb call 402930 1899->1901 1902 406ea1-406ea2 InternetCloseHandle 1900->1902 1903 406d28-406d5d HttpOpenRequestA 1900->1903 1910 406ec9-406ee0 call 402a20 * 2 1901->1910 1911 406ebd-406ebf 1901->1911 1902->1901 1905 406d63-406d65 1903->1905 1906 406e94-406e9e InternetCloseHandle 1903->1906 1908 406d67-406d77 InternetSetOptionA 1905->1908 1909 406d7d-406dad HttpSendRequestA HttpQueryInfoA 1905->1909 1906->1902 1908->1909 1912 406dd4-406de4 call 423d90 1909->1912 1913 406daf-406dd3 call 4271e0 call 402a20 * 2 1909->1913 1911->1910 1914 406ec1-406ec3 lstrcpy 1911->1914 1912->1913 1924 406de6-406de8 1912->1924 1914->1910 1926 406e8d-406e8e InternetCloseHandle 1924->1926 1927 406dee-406e07 InternetReadFile 1924->1927 1926->1906 1927->1926 1928 406e0d 1927->1928 1930 406e10-406e15 1928->1930 1930->1926 1932 406e17-406e3d call 427310 1930->1932 1935 406e44-406e51 call 402930 1932->1935 1936 406e3f call 402a20 1932->1936 1940 406e61-406e8b call 402a20 InternetReadFile 1935->1940 1941 406e53-406e57 1935->1941 1936->1935 1940->1926 1940->1930 1941->1940 1942 406e59-406e5b lstrcpy 1941->1942 1942->1940
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 00406C6F
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00406CC2
                        • InternetOpenA.WININET(0042CFEC,00000001,00000000,00000000,00000000), ref: 00406CD5
                        • StrCmpCA.SHLWAPI(?,02E1FEC0), ref: 00406CED
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406D15
                        • HttpOpenRequestA.WININET(00000000,GET,?,02E1F628,00000000,00000000,-00400100,00000000), ref: 00406D50
                        • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406D77
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406D86
                        • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406DA5
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00406DFF
                        • lstrcpy.KERNEL32(00000000,?), ref: 00406E5B
                        • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 00406E7D
                        • InternetCloseHandle.WININET(00000000), ref: 00406E8E
                        • InternetCloseHandle.WININET(?), ref: 00406E98
                        • InternetCloseHandle.WININET(00000000), ref: 00406EA2
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00406EC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                        • String ID: ERROR$GET
                        • API String ID: 3687753495-3591763792
                        • Opcode ID: 277e38131a39cec4d9c9ceb8bf16b3395a0fa65b5aabf89f400ef5f662ce2996
                        • Instruction ID: 91590bf360eea9fd530f380bfccddf156e0f5cf0bac8cd817fa6b8c96a2a5053
                        • Opcode Fuzzy Hash: 277e38131a39cec4d9c9ceb8bf16b3395a0fa65b5aabf89f400ef5f662ce2996
                        • Instruction Fuzzy Hash: 3B816F71B10315ABEB20DFA5DC89BAF77B9AF44700F154069F905B72C0DB78AD058BA8

                        Control-flow Graph

                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc
                        • String ID:
                        • API String ID: 190572456-0
                        • Opcode ID: c0e07e5736444788f42130480223deb20be2e16b05951c8c3a86ec550b31ae20
                        • Instruction ID: be81ce98aa493f162cc39ac66973376a527fee05715f75cc57822fee9a4dccdf
                        • Opcode Fuzzy Hash: c0e07e5736444788f42130480223deb20be2e16b05951c8c3a86ec550b31ae20
                        • Instruction Fuzzy Hash: 494183317007169BC720ABB6ED49B9F76A6AF50744F45003EF501E72A1DFB8E8058B98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2113 405640-4056a0 GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 2114 4056a2 2113->2114 2115 4056f6-40570c InternetCloseHandle * 2 2113->2115 2116 4056a8-4056c7 InternetReadFile 2114->2116 2117 405776-405781 2115->2117 2118 40570e-40571c 2115->2118 2119 4056f3 2116->2119 2120 4056c9 2116->2120 2121 405746-40574b 2118->2121 2122 40571e-405721 2118->2122 2119->2115 2125 4056d0-4056ed KiUserExceptionDispatcher 2120->2125 2121->2117 2124 40574d-405750 2121->2124 2122->2121 2123 405723-405729 2122->2123 2126 405730-405741 2123->2126 2127 40572b 2123->2127 2124->2117 2128 405752-405758 2124->2128 2125->2125 2129 4056ef-4056f1 2125->2129 2126->2121 2130 405743 2126->2130 2127->2126 2131 405760-405771 2128->2131 2132 40575a 2128->2132 2129->2116 2129->2119 2130->2121 2131->2117 2133 405773 2131->2133 2132->2131 2133->2117
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040565A
                        • RtlAllocateHeap.NTDLL(00000000), ref: 00405661
                        • InternetOpenA.WININET(Function_0002CFEC,00000000,00000000,00000000,00000000), ref: 00405677
                        • InternetOpenUrlA.WININET(00000000,00000001,00000000,00000000,04000100,00000000), ref: 00405692
                        • InternetReadFile.WININET(?,?,00000400,00000001), ref: 004056BC
                        • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 004056E1
                        • InternetCloseHandle.WININET(?), ref: 004056FA
                        • InternetCloseHandle.WININET(00000000), ref: 00405701
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$CloseHandleHeapOpen$AllocateDispatcherExceptionFileProcessReadUser
                        • String ID:
                        • API String ID: 1337183907-0
                        • Opcode ID: 56991fbfa8ff731cefd4789a31361217da942f2a87cf7d2a2611e9ffcee565a7
                        • Instruction ID: 497886bade507dc047050612015881185fcc427d3ee3b68b24892f00a211d5cf
                        • Opcode Fuzzy Hash: 56991fbfa8ff731cefd4789a31361217da942f2a87cf7d2a2611e9ffcee565a7
                        • Instruction Fuzzy Hash: 2E415C70A00605AFDB14CF54DD88F9BB7B5FF48304F14806AE909AB391D7759941CFA8
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 00422A6F
                        • HeapAlloc.KERNEL32(00000000), ref: 00422A76
                        • GetUserNameA.ADVAPI32(00000000,00000104), ref: 00422A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocNameProcessUser
                        • String ID:
                        • API String ID: 1206570057-0
                        • Opcode ID: 6c1fa00503cf644c0ad8ae9dfa58bb6559640976417a912d3d4b7ac5badfbdc6
                        • Instruction ID: daca8bc385b25320d3fa5486434c0ccaa4de5bcaee4211da3630c20ba90b8488
                        • Opcode Fuzzy Hash: 6c1fa00503cf644c0ad8ae9dfa58bb6559640976417a912d3d4b7ac5badfbdc6
                        • Instruction Fuzzy Hash: DBF0B4B1A44214AFC700DF88DD49B9EBBBCF704B21F10021AFD15E3280D7B419048BE1
                        APIs
                        • lstrlenA.KERNEL32(0042CFEC,00000001,00000000,00000000), ref: 0041F1D5
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F1F1
                        • lstrlenA.KERNEL32(0042CFEC), ref: 0041F1FC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F215
                        • lstrlenA.KERNEL32(0042CFEC), ref: 0041F220
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F239
                        • lstrcpy.KERNEL32(00000000,00434F9C), ref: 0041F25E
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F28C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F2C0
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0041F2F0
                        • lstrlenA.KERNEL32(02DF28C0), ref: 0041F315
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen
                        • String ID: ERROR
                        • API String ID: 367037083-2861137601
                        • Opcode ID: 77f58e9e4a73e238c65df14d81476ff21136097aed580324177bbc0d500d2e1d
                        • Instruction ID: 9040d6f19fad2f554d89e7cb04000db69b8e1dab663b12f148e4c904462f9889
                        • Opcode Fuzzy Hash: 77f58e9e4a73e238c65df14d81476ff21136097aed580324177bbc0d500d2e1d
                        • Instruction Fuzzy Hash: BFA23270A012059FCB20DF65D948A9BB7F5AF44314F18847AE809EB3A1DB79DC86CF94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1461 405790-4057b4 call 402930 1464 4057c5-4057cb call 404bc0 1461->1464 1465 4057b6-4057bb 1461->1465 1468 4057d0-405830 call 4240b0 lstrlenA call 4240b0 1464->1468 1465->1464 1466 4057bd-4057bf lstrcpy 1465->1466 1466->1464 1473 405832-40583a 1468->1473 1474 40583c-40584c call 402930 1468->1474 1473->1473 1473->1474 1477 40585a-405865 1474->1477 1478 40584e-405854 lstrcpy 1474->1478 1479 405867 1477->1479 1480 40587d-40588b call 402930 1477->1480 1478->1477 1481 405870-405878 1479->1481 1485 405899-4058a1 1480->1485 1486 40588d-405893 lstrcpy 1480->1486 1481->1481 1483 40587a 1481->1483 1483->1480 1487 4058a3-4058ab 1485->1487 1488 4058ad-4058bb call 402930 1485->1488 1486->1485 1487->1487 1487->1488 1491 4058c9-4058d4 1488->1491 1492 4058bd-4058c3 lstrcpy 1488->1492 1493 4058e3-4058f0 call 402930 1491->1493 1494 4058d6-4058de 1491->1494 1492->1491 1498 4058f2-4058f8 lstrcpy 1493->1498 1499 4058fe-405909 1493->1499 1494->1494 1495 4058e0 1494->1495 1495->1493 1498->1499 1500 40590b 1499->1500 1501 40591d-40592a call 402930 1499->1501 1503 405910-405918 1500->1503 1506 405938-40596a InternetOpenA StrCmpCA 1501->1506 1507 40592c-405932 lstrcpy 1501->1507 1503->1503 1504 40591a 1503->1504 1504->1501 1508 405973-405975 1506->1508 1509 40596c 1506->1509 1507->1506 1510 406004-4060c3 InternetCloseHandle call 402a20 * 17 1508->1510 1511 40597b-4059a3 call 423e70 call 402930 1508->1511 1509->1508 1521 4059c3-4059c8 1511->1521 1522 4059a5-4059a7 1511->1522 1523 4059ca call 402a20 1521->1523 1524 4059cf-4059dc call 402930 1521->1524 1522->1521 1526 4059a9-4059ac 1522->1526 1523->1524 1533 4059ea-405a15 call 402a20 * 2 lstrlenA call 402930 1524->1533 1534 4059de-4059e0 1524->1534 1526->1521 1530 4059ae-4059c0 lstrcpy lstrcatA 1526->1530 1530->1521 1549 405a32-405a40 call 402930 1533->1549 1550 405a17-405a1c 1533->1550 1534->1533 1536 4059e2-4059e4 lstrcpy 1534->1536 1536->1533 1558 405a42-405a44 1549->1558 1559 405a5f-405a79 lstrlenA call 402930 1549->1559 1550->1549 1552 405a1e-405a2c lstrcpy lstrcatA 1550->1552 1552->1549 1558->1559 1561 405a46-405a4a 1558->1561 1567 405a93-405a98 1559->1567 1568 405a7b-405a7d 1559->1568 1561->1559 1564 405a4c-405a59 lstrcpy lstrcatA 1561->1564 1564->1559 1571 405a9a call 402a20 1567->1571 1572 405a9f-405aac call 402930 1567->1572 1568->1567 1570 405a7f-405a8d lstrcpy lstrcatA 1568->1570 1570->1567 1571->1572 1578 405aba-405aee call 402a20 * 3 lstrlenA call 402930 1572->1578 1579 405aae-405ab0 1572->1579 1598 405af0-405af5 1578->1598 1599 405b0b-405b1d call 402930 1578->1599 1579->1578 1581 405ab2-405ab4 lstrcpy 1579->1581 1581->1578 1598->1599 1601 405af7-405af9 1598->1601 1604 405b3c-405b41 1599->1604 1605 405b1f-405b21 1599->1605 1601->1599 1603 405afb-405b05 lstrcpy lstrcatA 1601->1603 1603->1599 1607 405b43 call 402a20 1604->1607 1608 405b48-405b54 call 402930 1604->1608 1605->1604 1606 405b23-405b27 1605->1606 1606->1604 1609 405b29-405b36 lstrcpy lstrcatA 1606->1609 1607->1608 1613 405b62-405b99 call 402a20 * 2 InternetConnectA 1608->1613 1614 405b56-405b58 1608->1614 1609->1604 1620 405ffe-406001 1613->1620 1621 405b9f-405bd5 HttpOpenRequestA 1613->1621 1614->1613 1615 405b5a-405b5c lstrcpy 1614->1615 1615->1613 1620->1510 1622 405ff7-405ff8 InternetCloseHandle 1621->1622 1623 405bdb-405f34 call 427310 call 427280 call 402a20 call 4272c0 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 4272c0 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 4272c0 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 4272c0 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 call 427310 call 427280 call 402a20 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA memcpy lstrlenA memcpy lstrlenA * 2 memcpy lstrlenA HttpSendRequestA InternetReadFile 1621->1623 1622->1620 1756 405fea-405ff4 InternetCloseHandle 1623->1756 1757 405f3a 1623->1757 1756->1622 1758 405f40-405f45 1757->1758 1758->1756 1759 405f4b-405f74 lstrlenA call 402930 1758->1759 1762 405f92-405f99 1759->1762 1763 405f76-405f7a 1759->1763 1764 405fa6-405fb3 call 402930 1762->1764 1765 405f9b-405fa0 call 402a20 1762->1765 1763->1762 1766 405f7c-405f8c lstrcpy lstrcatA 1763->1766 1771 405fc1-405fe4 call 402a20 InternetReadFile 1764->1771 1772 405fb5-405fb7 1764->1772 1765->1764 1766->1762 1771->1756 1771->1758 1772->1771 1773 405fb9-405fbb lstrcpy 1772->1773 1773->1771
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 004057BF
                        • lstrlenA.KERNEL32(?), ref: 00405812
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 00405854
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 00405893
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 004058C3
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 004058F8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen
                        • String ID: ------$"$--$------$.A
                        • API String ID: 367037083-1166535305
                        • Opcode ID: 8b8e648e84790d0d315e7e9be9a642b64d15ba72e26f7175dbbc07fb82001778
                        • Instruction ID: 78e5efbc316df923fcc7cbd0813b046ea13c58d0eb3bd30a0976a401dee716d8
                        • Opcode Fuzzy Hash: 8b8e648e84790d0d315e7e9be9a642b64d15ba72e26f7175dbbc07fb82001778
                        • Instruction Fuzzy Hash: F1425D71B002199BCB20EBB9DD89A9F77B5AF44304F05543AF905B7291DB78AC058FE8

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1945 42658e-426623 GetProcAddress * 2 LoadLibraryA * 5 1947 426625-426633 GetProcAddress 1945->1947 1948 426638-42663f 1945->1948 1947->1948 1949 426641-426667 GetProcAddress * 2 1948->1949 1950 42666c-426673 1948->1950 1949->1950 1951 426675-426683 GetProcAddress 1950->1951 1952 426688-42668f 1950->1952 1951->1952 1953 426691-42669f GetProcAddress 1952->1953 1954 4266a4-4266ab 1952->1954 1953->1954 1955 4266d7-4266da 1954->1955 1956 4266ad-4266d2 GetProcAddress * 2 1954->1956 1956->1955
                        APIs
                        • GetProcAddress.KERNEL32(75550000,02E17088), ref: 0042659F
                        • GetProcAddress.KERNEL32(75550000,02DF27E0), ref: 004265B8
                        • LoadLibraryA.KERNEL32(02E170E8,?,?,?,00421C03), ref: 004265C9
                        • LoadLibraryA.KERNEL32(02E17130,?,?,?,00421C03), ref: 004265DB
                        • LoadLibraryA.KERNEL32(02E17178,?,?,?,00421C03), ref: 004265ED
                        • LoadLibraryA.KERNEL32(02E17160,?,?,?,00421C03), ref: 004265FE
                        • LoadLibraryA.KERNEL32(02E172E0,?,?,?,00421C03), ref: 00426610
                        • GetProcAddress.KERNEL32(75670000,02E17190), ref: 0042662D
                        • GetProcAddress.KERNEL32(75750000,02E171A8), ref: 00426649
                        • GetProcAddress.KERNEL32(75750000,02E17100), ref: 00426661
                        • GetProcAddress.KERNEL32(76BE0000,02E17280), ref: 0042667D
                        • GetProcAddress.KERNEL32(759D0000,02DF2620), ref: 00426699
                        • GetProcAddress.KERNEL32(773F0000,02DF4140), ref: 004266B5
                        • GetProcAddress.KERNEL32(773F0000,NtQueryInformationProcess), ref: 004266CC
                        Strings
                        • NtQueryInformationProcess, xrefs: 004266C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID: NtQueryInformationProcess
                        • API String ID: 2238633743-2781105232
                        • Opcode ID: 9fb865e721fbffa39379ccc749f7c1f062223782d0a66bb1a8d01fed4bc13022
                        • Instruction ID: 417828fd74631f7b98bacc5121334c04d36de36b3288361a418e6e9bbd4668d5
                        • Opcode Fuzzy Hash: 9fb865e721fbffa39379ccc749f7c1f062223782d0a66bb1a8d01fed4bc13022
                        • Instruction Fuzzy Hash: 24316BB5A113009FD758DFA9EE48AA63BBBB789745300651EF545C3260EBB49800CFB5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2018 2d0003c-2d00047 2019 2d00049 2018->2019 2020 2d0004c-2d00263 call 2d00a3f call 2d00e0f call 2d00d90 VirtualAlloc 2018->2020 2019->2020 2035 2d00265-2d00289 call 2d00a69 2020->2035 2036 2d0028b-2d00292 2020->2036 2041 2d002ce-2d003c2 VirtualProtect call 2d00cce call 2d00ce7 2035->2041 2038 2d002a1-2d002b0 2036->2038 2040 2d002b2-2d002cc 2038->2040 2038->2041 2040->2038 2047 2d003d1-2d003e0 2041->2047 2048 2d003e2-2d00437 call 2d00ce7 2047->2048 2049 2d00439-2d004b8 VirtualFree 2047->2049 2048->2047 2051 2d005f4-2d005fe 2049->2051 2052 2d004be-2d004cd 2049->2052 2055 2d00604-2d0060d 2051->2055 2056 2d0077f-2d00789 2051->2056 2054 2d004d3-2d004dd 2052->2054 2054->2051 2060 2d004e3-2d00505 LoadLibraryA 2054->2060 2055->2056 2061 2d00613-2d00637 2055->2061 2058 2d007a6-2d007b0 2056->2058 2059 2d0078b-2d007a3 2056->2059 2062 2d007b6-2d007cb 2058->2062 2063 2d0086e-2d008be LoadLibraryA 2058->2063 2059->2058 2064 2d00517-2d00520 2060->2064 2065 2d00507-2d00515 2060->2065 2066 2d0063e-2d00648 2061->2066 2067 2d007d2-2d007d5 2062->2067 2070 2d008c7-2d008f9 2063->2070 2068 2d00526-2d00547 2064->2068 2065->2068 2066->2056 2069 2d0064e-2d0065a 2066->2069 2071 2d00824-2d00833 2067->2071 2072 2d007d7-2d007e0 2067->2072 2073 2d0054d-2d00550 2068->2073 2069->2056 2074 2d00660-2d0066a 2069->2074 2075 2d00902-2d0091d 2070->2075 2076 2d008fb-2d00901 2070->2076 2082 2d00839-2d0083c 2071->2082 2077 2d007e2 2072->2077 2078 2d007e4-2d00822 2072->2078 2079 2d005e0-2d005ef 2073->2079 2080 2d00556-2d0056b 2073->2080 2081 2d0067a-2d00689 2074->2081 2076->2075 2077->2071 2078->2067 2079->2054 2083 2d0056d 2080->2083 2084 2d0056f-2d0057a 2080->2084 2085 2d00750-2d0077a 2081->2085 2086 2d0068f-2d006b2 2081->2086 2082->2063 2087 2d0083e-2d00847 2082->2087 2083->2079 2093 2d0059b-2d005bb 2084->2093 2094 2d0057c-2d00599 2084->2094 2085->2066 2088 2d006b4-2d006ed 2086->2088 2089 2d006ef-2d006fc 2086->2089 2090 2d00849 2087->2090 2091 2d0084b-2d0086c 2087->2091 2088->2089 2095 2d0074b 2089->2095 2096 2d006fe-2d00748 2089->2096 2090->2063 2091->2082 2101 2d005bd-2d005db 2093->2101 2094->2101 2095->2081 2096->2095 2101->2073
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 02D0024D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: cess$kernel32.dll
                        • API String ID: 4275171209-1230238691
                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction ID: 112ab9a8d626c55c735fcb8e96531faa9c8ff8868af091c86c716b5e6674c398
                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                        • Instruction Fuzzy Hash: 26525974A012299FDB64CF58C984BACBBB1BF09305F1480D9E54DAB3A1DB30AE95DF14

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2102 422740-422783 GetWindowsDirectoryA 2103 422785 2102->2103 2104 42278c-4227ea GetVolumeInformationA 2102->2104 2103->2104 2105 4227ec-4227f2 2104->2105 2106 4227f4-422807 2105->2106 2107 422809-422820 GetProcessHeap HeapAlloc 2105->2107 2106->2105 2108 422822-422824 2107->2108 2109 422826-422844 wsprintfA 2107->2109 2110 42285b-422872 call 4271e0 2108->2110 2109->2110
                        APIs
                        • GetWindowsDirectoryA.KERNEL32(?,00000104,?,02E17358,00000000), ref: 0042277B
                        • GetVolumeInformationA.KERNEL32(0042A440,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 004227AC
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0042280F
                        • HeapAlloc.KERNEL32(00000000), ref: 00422816
                        • wsprintfA.USER32 ref: 0042283B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowswsprintf
                        • String ID: :\$C
                        • API String ID: 1325379522-3309953409
                        • Opcode ID: ce0125ce13eb0816da93c0b4716b1f90aac9f737335d5e264dd372cef419b960
                        • Instruction ID: d93c7da38ddd29de155311ca5e1d1e4f781f7aaabd56b552648b56c95dd02ec1
                        • Opcode Fuzzy Hash: ce0125ce13eb0816da93c0b4716b1f90aac9f737335d5e264dd372cef419b960
                        • Instruction Fuzzy Hash: 4E3170B1908219AFCB04DFA89A859EFBFB8EF58740F10016EE505E7250E6748B408BA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2134 404bc0-404bce 2135 404bd0-404bd5 2134->2135 2135->2135 2136 404bd7-404c48 ??2@YAPAXI@Z * 3 lstrlenA InternetCrackUrlA call 402a20 2135->2136
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000800,02E17638), ref: 00404BF7
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404C01
                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404C0B
                        • lstrlenA.KERNEL32(?,00000000,?), ref: 00404C1F
                        • InternetCrackUrlA.WININET(?,00000000), ref: 00404C27
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ??2@$CrackInternetlstrlen
                        • String ID: <
                        • API String ID: 1683549937-4251816714
                        • Opcode ID: 285894264c2d7e9187e750985268b8b3b2c891db7afd2989fead038aed9c22b4
                        • Instruction ID: 1bd60353331dbecd9a7383d9733d23d0053dd466cc4828cfdfd0774d9622719e
                        • Opcode Fuzzy Hash: 285894264c2d7e9187e750985268b8b3b2c891db7afd2989fead038aed9c22b4
                        • Instruction Fuzzy Hash: D8012D71D00218AFDB10DFA9EC45B9EBBB8EB48364F00412AF914E7390EB7459058FD4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2139 422910-422953 GetProcessHeap HeapAlloc RegOpenKeyExA 2140 422955-422965 RegQueryValueExA 2139->2140 2141 42296b-42297e RegCloseKey 2139->2141 2140->2141 2142 422980-42298f 2141->2142 2143 422991-422994 2141->2143 2142->2142 2142->2143
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00422925
                        • HeapAlloc.KERNEL32(00000000), ref: 0042292C
                        • RegOpenKeyExA.KERNEL32(80000002,02E1A0B0,00000000,00020119,004228A9), ref: 0042294B
                        • RegQueryValueExA.KERNEL32(004228A9,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422965
                        • RegCloseKey.ADVAPI32(004228A9), ref: 0042296F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID: CurrentBuildNumber
                        • API String ID: 3466090806-1022791448
                        • Opcode ID: 5364e14c0a3d05156664c7df2c62bb00f5e878ba2183d47dff6cc4ea0b38e43d
                        • Instruction ID: c5fe118d464dd8edc36b27dd1f265e731215acc2a0e12dade4fb376ba34b0d4d
                        • Opcode Fuzzy Hash: 5364e14c0a3d05156664c7df2c62bb00f5e878ba2183d47dff6cc4ea0b38e43d
                        • Instruction Fuzzy Hash: 1501B175600329BFD314CBA0AC59EFB7BBDEB48755F100059FE4597240EAB159448BE0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2144 422880-4228ae GetProcessHeap HeapAlloc call 422910 2147 4228b0-4228b9 2144->2147 2148 4228ba-4228d9 RegOpenKeyExA 2144->2148 2149 4228f2-422902 RegCloseKey 2148->2149 2150 4228db-4228ec RegQueryValueExA 2148->2150 2150->2149
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00422895
                        • HeapAlloc.KERNEL32(00000000), ref: 0042289C
                          • Part of subcall function 00422910: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00422925
                          • Part of subcall function 00422910: HeapAlloc.KERNEL32(00000000), ref: 0042292C
                          • Part of subcall function 00422910: RegOpenKeyExA.KERNEL32(80000002,02E1A0B0,00000000,00020119,004228A9), ref: 0042294B
                          • Part of subcall function 00422910: RegQueryValueExA.KERNEL32(004228A9,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00422965
                          • Part of subcall function 00422910: RegCloseKey.ADVAPI32(004228A9), ref: 0042296F
                        • RegOpenKeyExA.KERNEL32(80000002,02E1A0B0,00000000,00020119,00419500), ref: 004228D1
                        • RegQueryValueExA.KERNEL32(00419500,02E1E3E0,00000000,00000000,00000000,000000FF), ref: 004228EC
                        • RegCloseKey.ADVAPI32(00419500), ref: 004228F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID: Windows 11
                        • API String ID: 3466090806-2517555085
                        • Opcode ID: 6afc374b1021e13fac2369d4108616fa2db62d40761026aa18e21b5f00d63e66
                        • Instruction ID: b838523736346adb7ce8e3c82dd77743de362bd687d96efd208b95ca381da15e
                        • Opcode Fuzzy Hash: 6afc374b1021e13fac2369d4108616fa2db62d40761026aa18e21b5f00d63e66
                        • Instruction Fuzzy Hash: B301A271B00318BFD714ABA4AD49FEA777EEB44315F000159FE09D3250DAB499448BE0
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,00000000,00000000,?,?,00421C8A), ref: 00401046
                        • VirtualAllocExNuma.KERNEL32(00000000,?,?,00421C8A), ref: 0040104D
                        • ExitProcess.KERNEL32 ref: 00401058
                        • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,00421C8A), ref: 0040106C
                        • VirtualFree.KERNEL32(00000000,17C841C0,00008000,?,?,00421C8A), ref: 004010AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Virtual$AllocProcess$CurrentExitFreeNuma
                        • String ID:
                        • API String ID: 3477276466-0
                        • Opcode ID: eebbf2a7d8a8f00017b338c7aa3164428bececb1a666839850d6e3d3436eabea
                        • Instruction ID: aa33e4c314b55322e5f005f032d3d73aad5dab283e8b13059c6bb542b9569755
                        • Opcode Fuzzy Hash: eebbf2a7d8a8f00017b338c7aa3164428bececb1a666839850d6e3d3436eabea
                        • Instruction Fuzzy Hash: 5E0144713403047BE7240A656C1AF6B77AEA781B01F209029F744F33D0DAB1EA008AB8
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 0041EEC3
                        • StrCmpCA.SHLWAPI(?,ERROR,?,?,?,?,?,?,?,?,?,0041F3E8), ref: 0041EEDE
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041EF3F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID: ERROR
                        • API String ID: 3722407311-2861137601
                        • Opcode ID: 72d5ddd9ec663449337a3931984c70009c9313c80dea8de56a7e8cf0e1bcc8b6
                        • Instruction ID: c28ac5a7a25757f932124dc7d3da9c4eb04f0c6587e56c0f8f9bd0407561c574
                        • Opcode Fuzzy Hash: 72d5ddd9ec663449337a3931984c70009c9313c80dea8de56a7e8cf0e1bcc8b6
                        • Instruction Fuzzy Hash: 662103747202065BCB21FF7ADD4969B37A4AF14304F04543EBC4AEB2D2DE78E8558B98
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitGlobalMemoryProcessStatus
                        • String ID: @
                        • API String ID: 803317263-2766056989
                        • Opcode ID: f127fba7727a91b88187df4bdea323de0718f2841fffded282c9bdb05d23b48c
                        • Instruction ID: 822a68ba0681b22967503a2222785f0e102d58cfae2bd9798b899adfc8918474
                        • Opcode Fuzzy Hash: f127fba7727a91b88187df4bdea323de0718f2841fffded282c9bdb05d23b48c
                        • Instruction Fuzzy Hash: A8F027701082444BEB186A64DD4A32EF7D9EB46350F10493BEEDAE72E2E278C840857F
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 00422AFF
                        • HeapAlloc.KERNEL32(00000000), ref: 00422B06
                        • GetComputerNameA.KERNEL32(00000000,00000104), ref: 00422B1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocComputerNameProcess
                        • String ID:
                        • API String ID: 4203777966-0
                        • Opcode ID: 0be16655d1dcf82a79328a1c088b057431a11f06d39f8fcbc5b2efcdb50dc0fe
                        • Instruction ID: 161a44a7ca907f82e4f91189bba25393484f2c5b0b651073a0db56667aea58a7
                        • Opcode Fuzzy Hash: 0be16655d1dcf82a79328a1c088b057431a11f06d39f8fcbc5b2efcdb50dc0fe
                        • Instruction Fuzzy Hash: 45018F72A44618ABC714CF99AD45B9AB7A8F744B21F00026AE915D2780D7B819008AA5
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02DFA076
                        • Module32First.KERNEL32(00000000,00000224), ref: 02DFA096
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF9000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2df9000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateFirstModule32SnapshotToolhelp32
                        • String ID:
                        • API String ID: 3833638111-0
                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction ID: 474bc2f65486ab4f4e3fac82ed2b7574fcfa512587bd9ba4afd26babf118124e
                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                        • Instruction Fuzzy Hash: FFF0F6361003106FD7603BF4BC8CBAE73E8AF4D228F210128E74695AC0CBB0EC058A69
                        APIs
                        • SetErrorMode.KERNEL32(00000400,?,?,02D00223,?,?), ref: 02D00E19
                        • SetErrorMode.KERNEL32(00000000,?,?,02D00223,?,?), ref: 02D00E1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorMode
                        • String ID:
                        • API String ID: 2340568224-0
                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction ID: 321e974b036e4f16ea177584da4ce767ebf48987a111953a049e8d08f4e0b479
                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                        • Instruction Fuzzy Hash: 4CD0123114512877D7002A94DC09BCD7B1CDF05B67F008011FB0DE9180C770994046E5
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 0041EE12
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 56cc2fd4b268bed5366ddfd9a30f0340bfcf23e6d13ca5de0974df139b39ebd2
                        • Instruction ID: fee62f33bcd31fc09c73aaf4a1b77b4d3787390e32f2935f10386d1c9e65d501
                        • Opcode Fuzzy Hash: 56cc2fd4b268bed5366ddfd9a30f0340bfcf23e6d13ca5de0974df139b39ebd2
                        • Instruction Fuzzy Hash: DE11C0713201055BCB25FF6EED4AA9F37A4AF50304F405039B849AB2D2DE78ED588B99
                        APIs
                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02DF9D5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF9000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2df9000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction ID: 821f6bd8b8362e04e5aa3f45100cb2b5ada12366f92d7be4e403187ebd65e614
                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                        • Instruction Fuzzy Hash: AC112A79A00208EFDB41DF98C985E98BBF5EB08351F1580A4FA489B361D371EA50DF94
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01949
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01980
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D019D3
                        • lstrcat.KERNEL32(00000000), ref: 02D019DD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01A09
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01A56
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01A60
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01A8C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01ADC
                        • lstrcat.KERNEL32(00000000), ref: 02D01AE6
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01B12
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01B5A
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01B65
                        • lstrlen.KERNEL32(00431794), ref: 02D01B70
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01B90
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01B9C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01BC2
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01BCD
                        • lstrlen.KERNEL32(00431798), ref: 02D01BD8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01BF5
                        • lstrcat.KERNEL32(00000000,00431798), ref: 02D01C01
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01C2A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01C75
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01C7D
                        • lstrlen.KERNEL32(00431794), ref: 02D01C88
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01CA8
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01CB4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01CDD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01CE8
                        • lstrlen.KERNEL32(00431794), ref: 02D01CF3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01D13
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01D1F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01D45
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01D50
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01D78
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D01DAC
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D01DD7
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D01DF1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01E2B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01E62
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01E6A
                        • lstrlen.KERNEL32(00431794), ref: 02D01E75
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01E98
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01EA4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01ED0
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01EDB
                        • lstrlen.KERNEL32(00431794), ref: 02D01EE6
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01F09
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01F15
                        • lstrlen.KERNEL32(?), ref: 02D01F22
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01F42
                        • lstrcat.KERNEL32(00000000,?), ref: 02D01F50
                        • lstrlen.KERNEL32(00431794), ref: 02D01F5B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01F7B
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D01F87
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01FAD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01FB8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01FE4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02047
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D02052
                        • lstrlen.KERNEL32(00431794), ref: 02D0205D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02080
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0208C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D020B2
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D020BD
                        • lstrlen.KERNEL32(00431794), ref: 02D020C8
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D020E8
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D020F4
                        • lstrlen.KERNEL32(?), ref: 02D02101
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02121
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0212F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0215B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D021A5
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D021AC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D02206
                        • lstrlen.KERNEL32(006389F0), ref: 02D02215
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D02242
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0224A
                        • lstrlen.KERNEL32(00431794), ref: 02D02255
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02275
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D02281
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D022A9
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D022B4
                        • lstrlen.KERNEL32(00431794), ref: 02D022BF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D022DC
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D022E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$File$AttributesFindFirstFolderPath
                        • String ID:
                        • API String ID: 4127656590-0
                        • Opcode ID: b47ce8a7f0e21845c30875caa1eccb5d7b5f46704766099070902513762b18b6
                        • Instruction ID: fe92247b9568fdd69c86efee5657353ec99c372148eee672870e74cb6fc46824
                        • Opcode Fuzzy Hash: b47ce8a7f0e21845c30875caa1eccb5d7b5f46704766099070902513762b18b6
                        • Instruction Fuzzy Hash: 7492F9719026569BCB11AF64CDCCBAEB7BAEF44708F144128E809A73A4DB74DD05CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DE28
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DE4B
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0DE56
                        • lstrlen.KERNEL32(00434CA4), ref: 02D0DE61
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DE7E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D0DE8A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DEB3
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DEF6
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DF26
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D0DF37
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D0DF57
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D0DF71
                        • lstrlen.KERNEL32(0042CFEC), ref: 02D0DF84
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DFAE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DFD7
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0DFE2
                        • lstrlen.KERNEL32(00431794), ref: 02D0DFED
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E00A
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E016
                        • lstrlen.KERNEL32(?), ref: 02D0E023
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E046
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0E054
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E080
                        • lstrlen.KERNEL32(00431794), ref: 02D0E0A4
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E0D6
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E0E2
                        • lstrlen.KERNEL32(00638D28), ref: 02D0E0F1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E117
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E122
                        • lstrlen.KERNEL32(00431794), ref: 02D0E12D
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E14D
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E159
                        • lstrlen.KERNEL32(006388C8), ref: 02D0E168
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E18E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E199
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E1C5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E20C
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E218
                        • lstrlen.KERNEL32(00638D28), ref: 02D0E227
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E250
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E25B
                        • lstrlen.KERNEL32(00431794), ref: 02D0E266
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E289
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E295
                        • lstrlen.KERNEL32(006388C8), ref: 02D0E2A4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E2CA
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E2D5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E301
                        • StrCmpCA.SHLWAPI(?,00434CA8), ref: 02D0E334
                        • StrCmpCA.SHLWAPI(?,00434CB0), ref: 02D0E34E
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0E386
                        • lstrlen.KERNEL32(00638CA4), ref: 02D0E395
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E3BC
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0E3C4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E406
                        • lstrcat.KERNEL32(00000000), ref: 02D0E410
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E437
                        • CopyFileA.KERNEL32(00000000,?,00000001), ref: 02D0E460
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0E496
                        • lstrlen.KERNEL32(006389F0), ref: 02D0E4A4
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E4C8
                        • lstrcat.KERNEL32(00000000,006389F0), ref: 02D0E4D0
                        • lstrlen.KERNEL32(00434CBC), ref: 02D0E4DB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E502
                        • lstrcat.KERNEL32(00000000,00434CBC), ref: 02D0E50E
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E536
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E576
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E5B0
                        • DeleteFileA.KERNEL32(?), ref: 02D0E5E8
                        • StrCmpCA.SHLWAPI(?,00638C74), ref: 02D0E612
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E65B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E683
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E6AC
                        • StrCmpCA.SHLWAPI(?,006388C8), ref: 02D0E6CF
                        • StrCmpCA.SHLWAPI(?,00638D28), ref: 02D0E6E4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E740
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D0E747
                        • StrCmpCA.SHLWAPI(?,00638CC8), ref: 02D0E7F5
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0E82B
                        • CopyFileA.KERNEL32(00000000,?,00000001), ref: 02D0E8A0
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E8DF
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E908
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E92E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E975
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E99E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E9C3
                        • StrCmpCA.SHLWAPI(?,00434CD0), ref: 02D0E9DD
                        • DeleteFileA.KERNEL32(?), ref: 02D0EA39
                        • StrCmpCA.SHLWAPI(?,00638B20), ref: 02D0EA63
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0EAF3
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0EB1C
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0EB55
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0EB7D
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0EBB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$File$CopyDelete$AttributesFindFirst
                        • String ID:
                        • API String ID: 2635522530-0
                        • Opcode ID: df1bd6274aba3b12cd408392eac2fcfb392000615a603bf693a119dd985772f0
                        • Instruction ID: 6c048ec795b0260c9c8a225838ea67f862bae57c37fa1dbb59ffc8fbca894fdc
                        • Opcode Fuzzy Hash: df1bd6274aba3b12cd408392eac2fcfb392000615a603bf693a119dd985772f0
                        • Instruction Fuzzy Hash: 3B922E719012569BCB20AF74DCC8BAEBBBAEF44304F144969E845A73A0DB74DD45CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D11B39
                        • lstrlen.KERNEL32(00431798), ref: 02D11B44
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11B66
                        • lstrcat.KERNEL32(00000000,00431798), ref: 02D11B72
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11B99
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D11BAE
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D11BCE
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D11BE8
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D11C26
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D11C59
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11C81
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11C8C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11CB3
                        • lstrlen.KERNEL32(00431794), ref: 02D11CC5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11CE7
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D11CF3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11D1B
                        • lstrlen.KERNEL32(?), ref: 02D11D2F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11D4C
                        • lstrcat.KERNEL32(00000000,?), ref: 02D11D5A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11D80
                        • lstrlen.KERNEL32(00638D00), ref: 02D11D96
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11DC0
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11DCB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11DF6
                        • lstrlen.KERNEL32(00431794), ref: 02D11E08
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11E2A
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D11E36
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11E5F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11E8C
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11E97
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11EBE
                        • lstrlen.KERNEL32(00431794), ref: 02D11ED0
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11EF2
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D11EFE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11F27
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11F56
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11F61
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11F88
                        • lstrlen.KERNEL32(00431794), ref: 02D11F9A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11FBC
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D11FC8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11FF1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12020
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1202B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12054
                        • lstrlen.KERNEL32(00431794), ref: 02D12080
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1209D
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D120A9
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D120CF
                        • lstrlen.KERNEL32(006389A8), ref: 02D120E5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12119
                        • lstrlen.KERNEL32(00431794), ref: 02D1212D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1214A
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D12156
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1217C
                        • lstrlen.KERNEL32(00638BDC), ref: 02D12192
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D121C6
                        • lstrlen.KERNEL32(00431794), ref: 02D121DA
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D121F7
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D12203
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12229
                        • lstrlen.KERNEL32(00638CE8), ref: 02D1223F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12267
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D12272
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1229D
                        • lstrlen.KERNEL32(00431794), ref: 02D122AF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D122CE
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D122DA
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D122FF
                        • lstrlen.KERNEL32(?), ref: 02D12313
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D12337
                        • lstrcat.KERNEL32(00000000,?), ref: 02D12345
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1236A
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D123A6
                        • lstrlen.KERNEL32(00638CA4), ref: 02D123B5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D123DD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D123E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$FileFindFirst
                        • String ID:
                        • API String ID: 712834838-0
                        • Opcode ID: 4ce771d22f91469fb80aa1fc91939a485c3ea60ca114c77d5d502a966bb14593
                        • Instruction ID: b2bbb7638ed9017b787f9bd7924535f416783f19f3a066ec8ea731d1e13a1a45
                        • Opcode Fuzzy Hash: 4ce771d22f91469fb80aa1fc91939a485c3ea60ca114c77d5d502a966bb14593
                        • Instruction Fuzzy Hash: 3C624C71502616ABCB21AF74DC8CBAEB7BAEF44708F144528E805A77A4DB74DD05CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16BFC
                        • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 02D16C2F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16C69
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16C90
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D16C9B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16CC4
                        • lstrlen.KERNEL32(00434D58), ref: 02D16CDE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16D00
                        • lstrcat.KERNEL32(00000000,00434D58), ref: 02D16D0C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16D37
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16D67
                        • LocalAlloc.KERNEL32(00000040,?), ref: 02D16D9C
                        • strtok_s.MSVCRT ref: 02D16DC9
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E04
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E34
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$AllocFolderLocalPathlstrlenstrtok_s
                        • String ID:
                        • API String ID: 922491270-0
                        • Opcode ID: eafb68b21d08b5959392c16b3f5027c3f0252857160b3bee96a810a3953ca481
                        • Instruction ID: 6b3b6349a15a9b1166cb473b02c1d8ad9ec0b9794ce75e945a64157e24363f23
                        • Opcode Fuzzy Hash: eafb68b21d08b5959392c16b3f5027c3f0252857160b3bee96a810a3953ca481
                        • Instruction Fuzzy Hash: CE425071A01256ABDB11ABB4EC8CBAEBBBAEF44704F145418F801977A0DB74DD05CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D06366
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D063B9
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D063EC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0641C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D06457
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0648A
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02D0649A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$InternetOpen
                        • String ID: "$------
                        • API String ID: 2041821634-2370822465
                        • Opcode ID: cf1a6c2041626ebf463119a37b4062f1c5bca86e292e3d2c8c6f5cb3243bbf73
                        • Instruction ID: dcb24d3b19825298d333dd14e6a5e4f912d8ba37f4f8465f8e91487825716497
                        • Opcode Fuzzy Hash: cf1a6c2041626ebf463119a37b4062f1c5bca86e292e3d2c8c6f5cb3243bbf73
                        • Instruction Fuzzy Hash: 5A5230719012569BDB11AFB4DCC8B9EB7BAEF44318F158424E905A73A0DB74EC05CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 004060FF
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00406152
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00406185
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 004061B5
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 004061F0
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00406223
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406233
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$InternetOpen
                        • String ID: "$------
                        • API String ID: 2041821634-2370822465
                        • Opcode ID: 04f9cf47dfec5be050777e69d84e98be2ec72ffd65f30c005331e705a2bd9645
                        • Instruction ID: ffbc6fd56c8a94c556c3f2c906f19bfa2bc12b6ecd202742e41b97733aae5ab7
                        • Opcode Fuzzy Hash: 04f9cf47dfec5be050777e69d84e98be2ec72ffd65f30c005331e705a2bd9645
                        • Instruction Fuzzy Hash: 9B525F71A002169BCB21ABB9DD49A9F77B9AF44304F15503AF806B72D1DB78DC05CFA8
                        APIs
                        • wsprintfA.USER32 ref: 02D13B93
                        • FindFirstFileA.KERNEL32(?,?), ref: 02D13BAA
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D13BD3
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D13BED
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D13C26
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D13C4E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D13C59
                        • lstrlen.KERNEL32(00431794), ref: 02D13C64
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13C81
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D13C8D
                        • lstrlen.KERNEL32(?), ref: 02D13C9A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13CBA
                        • lstrcat.KERNEL32(00000000,?), ref: 02D13CC8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13CF1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D13D35
                        • lstrlen.KERNEL32(?), ref: 02D13D3F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13D6C
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D13D77
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13D9D
                        • lstrlen.KERNEL32(00431794), ref: 02D13DAF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13DD1
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D13DDD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13E05
                        • lstrlen.KERNEL32(?), ref: 02D13E19
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13E39
                        • lstrcat.KERNEL32(00000000,?), ref: 02D13E47
                        • lstrlen.KERNEL32(006389F0), ref: 02D13E72
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13E98
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D13EA3
                        • lstrlen.KERNEL32(00638D00), ref: 02D13EC5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13EEB
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D13EF6
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13F1E
                        • lstrlen.KERNEL32(00431794), ref: 02D13F30
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13F4F
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D13F5B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13F81
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D13FAE
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D13FB9
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D13FE0
                        • lstrlen.KERNEL32(00431794), ref: 02D13FF2
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14014
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D14020
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14049
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14078
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D14083
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D140AA
                        • lstrlen.KERNEL32(00431794), ref: 02D140BC
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D140DE
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D140EA
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14113
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14142
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1414D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14174
                        • lstrlen.KERNEL32(00431794), ref: 02D14186
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D141A8
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D141B4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D141DC
                        • lstrlen.KERNEL32(?), ref: 02D141F0
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14210
                        • lstrcat.KERNEL32(00000000,?), ref: 02D1421E
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14247
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14286
                        • lstrlen.KERNEL32(00638CA4), ref: 02D14295
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D142BD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D142C8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D142F1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14335
                        • lstrcat.KERNEL32(00000000), ref: 02D14342
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D14540
                        • FindClose.KERNEL32(00000000), ref: 02D1454F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$Find$File$CloseFirstNextwsprintf
                        • String ID:
                        • API String ID: 1006159827-0
                        • Opcode ID: 55ba17bff02ee27f2bb2d89e516c7728b2b25d5ac4c7a1b0abb5fe8dbff3d3d8
                        • Instruction ID: d79b11b8077ffbdea050d86c63c42359740034ebc83441d961b00dc195d75e15
                        • Opcode Fuzzy Hash: 55ba17bff02ee27f2bb2d89e516c7728b2b25d5ac4c7a1b0abb5fe8dbff3d3d8
                        • Instruction Fuzzy Hash: 90627575901616ABCB11AF74ED8CBAEB7BAEF44308F144528E805A77A0DB74DD05CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D04EE6
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D04F39
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D04F6C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D04F9C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D04FDA
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0500D
                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02D0501D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$InternetOpen
                        • String ID: "$------
                        • API String ID: 2041821634-2370822465
                        • Opcode ID: eaa2490e6988f320b6a1ade99cc003943cb06326491ce6d684f1855e1fbd764e
                        • Instruction ID: 62d00c1efa2872a6769f457f897b9eed87658beb088843fadc38aa858baa2f32
                        • Opcode Fuzzy Hash: eaa2490e6988f320b6a1ade99cc003943cb06326491ce6d684f1855e1fbd764e
                        • Instruction Fuzzy Hash: 50525C719012569BDB21EFB4DC88BADBBBAEF44318F145424E905A73A0DB74EC45CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DE28
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DE4B
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0DE56
                        • lstrlen.KERNEL32(00434CA4), ref: 02D0DE61
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DE7E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D0DE8A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DEB3
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DEF6
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DF26
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D0DF37
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D0DF57
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D0DF71
                        • lstrlen.KERNEL32(0042CFEC), ref: 02D0DF84
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0DFAE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0DFD7
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0DFE2
                        • lstrlen.KERNEL32(00431794), ref: 02D0DFED
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E00A
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E016
                        • lstrlen.KERNEL32(?), ref: 02D0E023
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E046
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0E054
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E080
                        • lstrlen.KERNEL32(00431794), ref: 02D0E0A4
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E0D6
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E0E2
                        • lstrlen.KERNEL32(00638D28), ref: 02D0E0F1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E117
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E122
                        • lstrlen.KERNEL32(00431794), ref: 02D0E12D
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E14D
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E159
                        • lstrlen.KERNEL32(006388C8), ref: 02D0E168
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E18E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E199
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E1C5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E20C
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E218
                        • lstrlen.KERNEL32(00638D28), ref: 02D0E227
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E250
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E25B
                        • lstrlen.KERNEL32(00431794), ref: 02D0E266
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E289
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D0E295
                        • lstrlen.KERNEL32(006388C8), ref: 02D0E2A4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E2CA
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0E2D5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E301
                        • StrCmpCA.SHLWAPI(?,00434CA8), ref: 02D0E334
                        • StrCmpCA.SHLWAPI(?,00434CB0), ref: 02D0E34E
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0E386
                        • lstrlen.KERNEL32(00638CA4), ref: 02D0E395
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E3BC
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0E3C4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E406
                        • lstrcat.KERNEL32(00000000), ref: 02D0E410
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0E437
                        • CopyFileA.KERNEL32(00000000,?,00000001), ref: 02D0E460
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0E496
                        • lstrlen.KERNEL32(006389F0), ref: 02D0E4A4
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0E4C8
                        • lstrcat.KERNEL32(00000000,006389F0), ref: 02D0E4D0
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D0EBEF
                        • FindClose.KERNEL32(00000000), ref: 02D0EBFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$FileFind$CloseCopyFirstNext
                        • String ID:
                        • API String ID: 1346089424-0
                        • Opcode ID: d1e183e24c838eb74bc44f38f99ce4fe9a798cbb56237ed8471f726288990ab3
                        • Instruction ID: 8e76d5654b66b1837fc890ba7098b03d89777ef3da3b29d8e98cfe16e704c8f9
                        • Opcode Fuzzy Hash: d1e183e24c838eb74bc44f38f99ce4fe9a798cbb56237ed8471f726288990ab3
                        • Instruction Fuzzy Hash: D0520B71A016569BCB20AFB4DDCCBAEBBB6EF44304F144969A805973A0DB74DC45CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E04
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E34
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E64
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D16E96
                        • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 02D16EA3
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D16EAA
                        • StrStrA.SHLWAPI(00000000,00434D88), ref: 02D16EC1
                        • lstrlen.KERNEL32(00000000), ref: 02D16ECC
                        • malloc.MSVCRT ref: 02D16ED6
                        • strncpy.MSVCRT ref: 02D16EE4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16F0F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16F36
                        • StrStrA.SHLWAPI(00000000,00434D90), ref: 02D16F49
                        • lstrlen.KERNEL32(00000000), ref: 02D16F54
                        • malloc.MSVCRT ref: 02D16F5E
                        • strncpy.MSVCRT ref: 02D16F6C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16F97
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16FBE
                        • StrStrA.SHLWAPI(00000000,00434D98), ref: 02D16FD1
                        • lstrlen.KERNEL32(00000000), ref: 02D16FDC
                        • malloc.MSVCRT ref: 02D16FE6
                        • strncpy.MSVCRT ref: 02D16FF4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1701F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D17046
                        • StrStrA.SHLWAPI(00000000,00434DA0), ref: 02D17059
                        • lstrlen.KERNEL32(00000000), ref: 02D17068
                        • malloc.MSVCRT ref: 02D17072
                        • strncpy.MSVCRT ref: 02D17080
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D170B0
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D170D8
                        • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 02D170FB
                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 02D1710F
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00000000,00000000,00000000), ref: 02D17130
                        • LocalFree.KERNEL32(00000000), ref: 02D1713B
                        • lstrlen.KERNEL32(?), ref: 02D171D5
                        • lstrlen.KERNEL32(?), ref: 02D171E8
                        • lstrlen.KERNEL32(?), ref: 02D171FB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$mallocstrncpy$BinaryCryptHeapLocalString$AllocAllocateFreeProcess
                        • String ID:
                        • API String ID: 2413810636-0
                        • Opcode ID: 8e357f5a8b514afc5501354df5a1341233d7ce63c8ec9d167fd008e543547116
                        • Instruction ID: 0b52dd24620d0b8b3af28c8b9f34cb4765d85bd32f7f5c043712e12514789c64
                        • Opcode Fuzzy Hash: 8e357f5a8b514afc5501354df5a1341233d7ce63c8ec9d167fd008e543547116
                        • Instruction Fuzzy Hash: D1023E75A01256ABDB11ABB4EC8CB9EBBBAEF04704F145418F805E77A0DB74DD01CBA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14DB8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14DDB
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D14DE6
                        • lstrlen.KERNEL32(00434CA4), ref: 02D14DF1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14E0E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D14E1A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14E45
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D14E61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FileFindFirstlstrlen
                        • String ID:
                        • API String ID: 2567437900-0
                        • Opcode ID: adb27d7dacb31245e4674c0be4222ac75c9e854827ba9e862aaf555f94067a1f
                        • Instruction ID: 43bc8b551732cfe6a57309cdfb3cdd64c6783678ea79018453d29f21e81218f7
                        • Opcode Fuzzy Hash: adb27d7dacb31245e4674c0be4222ac75c9e854827ba9e862aaf555f94067a1f
                        • Instruction Fuzzy Hash: 74923F70A012019FDB24DF29E988B69B7F6AF84318F5980ADE8099B7A1D775DC41CF90
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D114F8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1151B
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11526
                        • lstrlen.KERNEL32(00434CA4), ref: 02D11531
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1154E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D1155A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11585
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D115A1
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D115C3
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D115DD
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D11616
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1163E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11649
                        • lstrlen.KERNEL32(00431794), ref: 02D11654
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11671
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D1167D
                        • lstrlen.KERNEL32(?), ref: 02D1168A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D116AA
                        • lstrcat.KERNEL32(00000000,?), ref: 02D116B8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D116E1
                        • StrCmpCA.SHLWAPI(?,00638C28), ref: 02D1170A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1174B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11774
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1179C
                        • StrCmpCA.SHLWAPI(?,006388A8), ref: 02D117B9
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D117FA
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11823
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1184B
                        • StrCmpCA.SHLWAPI(?,00638E3C), ref: 02D11869
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1189A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D118C3
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D118EC
                        • StrCmpCA.SHLWAPI(?,00638938), ref: 02D1191A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1195B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11984
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D119AC
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D119FD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11A25
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11A5C
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D11A83
                        • FindClose.KERNEL32(00000000), ref: 02D11A92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$Findlstrlen$File$CloseFirstNext
                        • String ID:
                        • API String ID: 1346933759-0
                        • Opcode ID: cc99e91d25dbf7c2b882c41ba1a681dd11c02f8c6b39d3f02d38f063ee02ee89
                        • Instruction ID: f3951d55c18ffe95d1638eb7b2f3794823b87282ea00b44958753ad8b40b34f5
                        • Opcode Fuzzy Hash: cc99e91d25dbf7c2b882c41ba1a681dd11c02f8c6b39d3f02d38f063ee02ee89
                        • Instruction Fuzzy Hash: FF125170A01246ABDB24EF74EC8CAAE7BB6EF44304F144528E95997790DB74DC45CFA0
                        APIs
                        • GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 02D26650
                        • GetProcAddress.KERNEL32(006390E0,00638E44), ref: 02D26669
                        • GetProcAddress.KERNEL32(006390E0,00638A64), ref: 02D26681
                        • GetProcAddress.KERNEL32(006390E0,00638A50), ref: 02D26699
                        • GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 02D266B2
                        • GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 02D266CA
                        • GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 02D266E2
                        • GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 02D266FB
                        • GetProcAddress.KERNEL32(006390E0,00638D48), ref: 02D26713
                        • GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 02D2672B
                        • GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 02D26744
                        • GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 02D2675C
                        • GetProcAddress.KERNEL32(006390E0,006388B0), ref: 02D26774
                        • GetProcAddress.KERNEL32(006390E0,00638D98), ref: 02D2678D
                        • GetProcAddress.KERNEL32(006390E0,00638A24), ref: 02D267A5
                        • GetProcAddress.KERNEL32(006390E0,00638C18), ref: 02D267BD
                        • GetProcAddress.KERNEL32(006390E0,00638E34), ref: 02D267D6
                        • GetProcAddress.KERNEL32(006390E0,006388BC), ref: 02D267EE
                        • GetProcAddress.KERNEL32(006390E0,0063892C), ref: 02D26806
                        • GetProcAddress.KERNEL32(006390E0,00638AB0), ref: 02D2681F
                        • LoadLibraryA.KERNEL32(00638D50,?,?,?,02D21E6A), ref: 02D26830
                        • LoadLibraryA.KERNEL32(0063897C,?,?,?,02D21E6A), ref: 02D26842
                        • LoadLibraryA.KERNEL32(00638904,?,?,?,02D21E6A), ref: 02D26854
                        • LoadLibraryA.KERNEL32(006389DC,?,?,?,02D21E6A), ref: 02D26865
                        • LoadLibraryA.KERNEL32(00638B28,?,?,?,02D21E6A), ref: 02D26877
                        • GetProcAddress.KERNEL32(00638EF8,00638CAC), ref: 02D26894
                        • GetProcAddress.KERNEL32(00639020,00638C24), ref: 02D268B0
                        • GetProcAddress.KERNEL32(00639020,006389CC), ref: 02D268C8
                        • GetProcAddress.KERNEL32(00639114,00638B94), ref: 02D268E4
                        • GetProcAddress.KERNEL32(00638FD4,00638928), ref: 02D26900
                        • GetProcAddress.KERNEL32(00639004,00638C14), ref: 02D2691C
                        • GetProcAddress.KERNEL32(00639004,0043529C), ref: 02D26933
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID:
                        • API String ID: 2238633743-0
                        • Opcode ID: 08423d41d42870b35824142912b907ad99356ee077fbccda2de61b0a00986185
                        • Instruction ID: 5c50943ed911b933a3a11907f55c015ddfd9ad38c2bd2d9bacfd6a530f5ba0ed
                        • Opcode Fuzzy Hash: 08423d41d42870b35824142912b907ad99356ee077fbccda2de61b0a00986185
                        • Instruction Fuzzy Hash: A0A16BB9A117009FD758DF69EE88A6637BBF789344300A51DF95683360DBB4A900DFB0
                        APIs
                        • memset.MSVCRT ref: 00409790
                        • lstrcatA.KERNEL32(?,?), ref: 004097A0
                        • lstrcatA.KERNEL32(?,?), ref: 004097B1
                        • lstrcatA.KERNEL32(?, --remote-debugging-port=9229 --profile-directory="), ref: 004097C3
                        • memset.MSVCRT ref: 004097D7
                          • Part of subcall function 00423E70: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00423EA5
                          • Part of subcall function 00423E70: lstrcpy.KERNEL32(00000000,02E197B0), ref: 00423ECF
                          • Part of subcall function 00423E70: GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00404DFA,?,00000014), ref: 00423ED9
                        • wsprintfA.USER32 ref: 00409806
                        • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 00409827
                        • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 00409844
                          • Part of subcall function 004246A0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004246B9
                          • Part of subcall function 004246A0: Process32First.KERNEL32(00000000,00000128), ref: 004246C9
                          • Part of subcall function 004246A0: Process32Next.KERNEL32(00000000,00000128), ref: 004246DB
                          • Part of subcall function 004246A0: StrCmpCA.SHLWAPI(?,?), ref: 004246ED
                          • Part of subcall function 004246A0: OpenProcess.KERNEL32(00000001,00000000,?), ref: 00424702
                          • Part of subcall function 004246A0: TerminateProcess.KERNEL32(00000000,00000000), ref: 00424711
                          • Part of subcall function 004246A0: CloseHandle.KERNEL32(00000000), ref: 00424718
                          • Part of subcall function 004246A0: Process32Next.KERNEL32(00000000,00000128), ref: 00424726
                          • Part of subcall function 004246A0: CloseHandle.KERNEL32(00000000), ref: 00424731
                        • memset.MSVCRT ref: 00409862
                        • lstrcatA.KERNEL32(00000000,?), ref: 00409878
                        • lstrcatA.KERNEL32(00000000,?), ref: 00409889
                        • lstrcatA.KERNEL32(00000000,00434B60), ref: 0040989B
                        • memset.MSVCRT ref: 004098AF
                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 004098D4
                        • lstrcpy.KERNEL32(00000000,?), ref: 00409903
                        • StrStrA.SHLWAPI(00000000,02E1E710), ref: 00409919
                        • lstrcpyn.KERNEL32(006393D0,00000000,00000000), ref: 00409938
                        • lstrlenA.KERNEL32(?), ref: 0040994B
                        • wsprintfA.USER32 ref: 0040995B
                        • lstrcpy.KERNEL32(?,00000000), ref: 00409971
                        • memset.MSVCRT ref: 00409986
                        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 004099D8
                        • Sleep.KERNEL32(00001388), ref: 004099E7
                          • Part of subcall function 00401530: lstrcpy.KERNEL32(00000000,?), ref: 00401557
                          • Part of subcall function 00401530: lstrcpy.KERNEL32(00000000,?), ref: 00401579
                          • Part of subcall function 00401530: lstrcpy.KERNEL32(00000000,?), ref: 0040159B
                          • Part of subcall function 00401530: lstrcpy.KERNEL32(00000000,?), ref: 004015FF
                          • Part of subcall function 004092B0: strlen.MSVCRT ref: 004092E1
                          • Part of subcall function 004092B0: strlen.MSVCRT ref: 004092FA
                          • Part of subcall function 004092B0: memset.MSVCRT ref: 00409341
                          • Part of subcall function 004092B0: lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 0040935C
                          • Part of subcall function 004092B0: lstrcatA.KERNEL32(?,00000000), ref: 00409372
                          • Part of subcall function 004092B0: strlen.MSVCRT ref: 00409399
                          • Part of subcall function 004092B0: strlen.MSVCRT ref: 004093E6
                          • Part of subcall function 00424740: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 00424759
                          • Part of subcall function 00424740: Process32First.KERNEL32(00000000,00000128), ref: 00424769
                          • Part of subcall function 00424740: Process32Next.KERNEL32(00000000,00000128), ref: 0042477B
                          • Part of subcall function 00424740: OpenProcess.KERNEL32(00000001,00000000,?), ref: 0042479C
                          • Part of subcall function 00424740: TerminateProcess.KERNEL32(00000000,00000000), ref: 004247AB
                          • Part of subcall function 00424740: CloseHandle.KERNEL32(00000000), ref: 004247B2
                          • Part of subcall function 00424740: Process32Next.KERNEL32(00000000,00000128), ref: 004247C0
                          • Part of subcall function 00424740: CloseHandle.KERNEL32(00000000), ref: 004247CB
                        • CloseDesktop.USER32(?), ref: 00409A1C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcatlstrcpy$Process32memset$CloseProcess$CreateHandleNextstrlen$DesktopOpen$FirstSnapshotTerminateToolhelp32wsprintf$FolderPathSleepSystemTimelstrcpynlstrlen
                        • String ID: --remote-debugging-port=9229 --profile-directory="$%s%s$D
                        • API String ID: 67568813-1862457068
                        • Opcode ID: e42de8a202d5d6dea2dc93eaaf91a578506c47d524820bb0a75ed9ed1e9241c9
                        • Instruction ID: 2c37e3413e6ee4b4ed1961789d92b732caee71be02ea627586429f29572cbb88
                        • Opcode Fuzzy Hash: e42de8a202d5d6dea2dc93eaaf91a578506c47d524820bb0a75ed9ed1e9241c9
                        • Instruction Fuzzy Hash: 85916271A10218AFDB10DF64DC89FDE77B9AF48700F5041A9F609A72D1DFB4AA448FA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D114F8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1151B
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11526
                        • lstrlen.KERNEL32(00434CA4), ref: 02D11531
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1154E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D1155A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11585
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D115A1
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D115C3
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D115DD
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D11616
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1163E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D11649
                        • lstrlen.KERNEL32(00431794), ref: 02D11654
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11671
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D1167D
                        • lstrlen.KERNEL32(?), ref: 02D1168A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D116AA
                        • lstrcat.KERNEL32(00000000,?), ref: 02D116B8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D116E1
                        • StrCmpCA.SHLWAPI(?,00638C28), ref: 02D1170A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1174B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11774
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1179C
                        • StrCmpCA.SHLWAPI(?,006388A8), ref: 02D117B9
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D117FA
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11823
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1184B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D119FD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D11A25
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D11A5C
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D11A83
                        • FindClose.KERNEL32(00000000), ref: 02D11A92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$Findlstrlen$File$CloseFirstNext
                        • String ID:
                        • API String ID: 1346933759-0
                        • Opcode ID: be495782e5e69fd1e300f1058cd6e7670e16721e9f53d5594ca678ea9e884695
                        • Instruction ID: 2e299a00136dffd9cc2f19e7f871e573b4658e6964e8bff93ac15de5cdfc3ea6
                        • Opcode Fuzzy Hash: be495782e5e69fd1e300f1058cd6e7670e16721e9f53d5594ca678ea9e884695
                        • Instruction Fuzzy Hash: 2EC14E71A01656ABCB20AF74DC8CBAE7BB6EF04304F144528E909977A0DB74DD05CFA0
                        APIs
                        • wsprintfA.USER32 ref: 02D1CE63
                        • FindFirstFileA.KERNEL32(?,?), ref: 02D1CE7A
                        • lstrcat.KERNEL32(?,?), ref: 02D1CEC6
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D1CED8
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D1CEF2
                        • wsprintfA.USER32 ref: 02D1CF17
                        • PathMatchSpecA.SHLWAPI(?,00638D64), ref: 02D1CF49
                        • CoInitialize.OLE32(00000000), ref: 02D1CF55
                          • Part of subcall function 02D1CD47: CoCreateInstance.COMBASE(0042B110,00000000,00000001,0042B100,?), ref: 02D1CD6D
                          • Part of subcall function 02D1CD47: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104), ref: 02D1CDAD
                          • Part of subcall function 02D1CD47: lstrcpyn.KERNEL32(?,?,00000104), ref: 02D1CE30
                        • CoUninitialize.COMBASE ref: 02D1CF70
                        • lstrcat.KERNEL32(?,?), ref: 02D1CF95
                        • lstrlen.KERNEL32(?), ref: 02D1CFA2
                        • StrCmpCA.SHLWAPI(?,0042CFEC), ref: 02D1CFBC
                        • wsprintfA.USER32 ref: 02D1CFE4
                        • wsprintfA.USER32 ref: 02D1D003
                        • PathMatchSpecA.SHLWAPI(?,?), ref: 02D1D017
                        • wsprintfA.USER32 ref: 02D1D03F
                        • CopyFileA.KERNEL32(?,?,00000001), ref: 02D1D058
                        • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 02D1D077
                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 02D1D08F
                        • CloseHandle.KERNEL32(00000000), ref: 02D1D09A
                        • CloseHandle.KERNEL32(00000000), ref: 02D1D0A6
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02D1D0BB
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1D0FB
                        • FindNextFileA.KERNEL32(?,?), ref: 02D1D1F4
                        • FindClose.KERNEL32(?), ref: 02D1D206
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Filewsprintf$CloseFind$CreateHandleMatchPathSpeclstrcat$ByteCharCopyFirstInitializeInstanceMultiNextSizeUninitializeUnothrow_t@std@@@Wide__ehfuncinfo$??2@lstrcpylstrcpynlstrlen
                        • String ID:
                        • API String ID: 3860919712-0
                        • Opcode ID: 1e6a93290bb48ebea9772b804d05712693bbf75eec94ca6b3c8864a1428dd4ec
                        • Instruction ID: 8f6d11f5767558509b760b7114d5ecd2e5f957c734d6117bb84fde4404202839
                        • Opcode Fuzzy Hash: 1e6a93290bb48ebea9772b804d05712693bbf75eec94ca6b3c8864a1428dd4ec
                        • Instruction Fuzzy Hash: CDC13E75900219AFCB14DF64DC88BEE777AEF48304F144599F909A7690EB74AE84CFA0
                        APIs
                        • wsprintfA.USER32 ref: 02D1E493
                        • FindFirstFileA.KERNEL32(?,?), ref: 02D1E4AA
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D1E4CA
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D1E4E4
                        • wsprintfA.USER32 ref: 02D1E509
                        • StrCmpCA.SHLWAPI(?,0042CFEC), ref: 02D1E51B
                        • wsprintfA.USER32 ref: 02D1E538
                          • Part of subcall function 02D1F047: lstrcpy.KERNEL32(00000000,?), ref: 02D1F079
                        • wsprintfA.USER32 ref: 02D1E557
                        • PathMatchSpecA.SHLWAPI(?,?), ref: 02D1E56B
                        • lstrcat.KERNEL32(?,00638D24), ref: 02D1E59C
                        • lstrcat.KERNEL32(?,00431794), ref: 02D1E5AE
                        • lstrcat.KERNEL32(?,?), ref: 02D1E5BF
                        • lstrcat.KERNEL32(?,00431794), ref: 02D1E5D1
                        • lstrcat.KERNEL32(?,?), ref: 02D1E5E5
                        • CopyFileA.KERNEL32(?,?,00000001), ref: 02D1E5FB
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E639
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E689
                        • DeleteFileA.KERNEL32(?), ref: 02D1E6C3
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D1E702
                        • FindClose.KERNEL32(00000000), ref: 02D1E711
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$Filewsprintf$Find$CloseCopyDeleteFirstMatchNextPathSpec
                        • String ID:
                        • API String ID: 1375681507-0
                        • Opcode ID: c1c9efcaad2f5e6ed68961a17fa1f607964aba2db125c197c65617b576b34e73
                        • Instruction ID: dc4a68c09b84f00d1790571776e971f97cb1604e258ecee17bb5b32ceb34c806
                        • Opcode Fuzzy Hash: c1c9efcaad2f5e6ed68961a17fa1f607964aba2db125c197c65617b576b34e73
                        • Instruction Fuzzy Hash: B88164B1900259ABCB14EF64DC88EEE777AFF44304F044599F90593650EB75AE48CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01949
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01980
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D019D3
                        • lstrcat.KERNEL32(00000000), ref: 02D019DD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01A09
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01B5A
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D01B65
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat
                        • String ID:
                        • API String ID: 2276651480-0
                        • Opcode ID: c4b74769114b713f627fa1af7ac0ecb7a329170a52fe1645dd556dd1b1344424
                        • Instruction ID: 667335946c83d3dd85f59afb4b1ddf51da66e995d80ae2dbdb5abfe71761e1fb
                        • Opcode Fuzzy Hash: c4b74769114b713f627fa1af7ac0ecb7a329170a52fe1645dd556dd1b1344424
                        • Instruction Fuzzy Hash: 1E81197590165A9BCB11EF68DDC8BAEB7B6EF40308F144124E809A73A0EB74DD05CFA4
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02D1DFAC
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D1DFB3
                        • wsprintfA.USER32 ref: 02D1DFC9
                        • FindFirstFileA.KERNEL32(?,?), ref: 02D1DFE0
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D1E003
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D1E01D
                        • wsprintfA.USER32 ref: 02D1E03B
                        • DeleteFileA.KERNEL32(?), ref: 02D1E087
                        • CopyFileA.KERNEL32(?,?,00000001), ref: 02D1E054
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                          • Part of subcall function 02D1DBE7: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1DC42
                          • Part of subcall function 02D1DBE7: lstrcpy.KERNEL32(00000000,?), ref: 02D1DC75
                          • Part of subcall function 02D1DBE7: lstrcat.KERNEL32(?,00000000), ref: 02D1DC83
                          • Part of subcall function 02D1DBE7: lstrcat.KERNEL32(?,00638B0C), ref: 02D1DC9D
                          • Part of subcall function 02D1DBE7: lstrcat.KERNEL32(?,?), ref: 02D1DCB1
                          • Part of subcall function 02D1DBE7: lstrcat.KERNEL32(?,00638DD8), ref: 02D1DCC5
                          • Part of subcall function 02D1DBE7: lstrcpy.KERNEL32(00000000,?), ref: 02D1DCF5
                          • Part of subcall function 02D1DBE7: GetFileAttributesA.KERNEL32(00000000), ref: 02D1DCFC
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D1E095
                        • FindClose.KERNEL32(00000000), ref: 02D1E0A4
                        • lstrcat.KERNEL32(?,00638D24), ref: 02D1E0CD
                        • lstrcat.KERNEL32(?,00638A2C), ref: 02D1E0E1
                        • lstrlen.KERNEL32(?), ref: 02D1E0EB
                        • lstrlen.KERNEL32(?), ref: 02D1E0F9
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E139
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$File$Find$Heaplstrlenwsprintf$AllocateAttributesCloseCopyDeleteFirstFolderNextPathProcess
                        • String ID:
                        • API String ID: 3181694991-0
                        • Opcode ID: 16588d79e064be33b0955ab269401267c5d66f00aa31094a3ef177447a8a1426
                        • Instruction ID: 619c1710e82e386b019649b3dc15e43a9413cc18240ad52445846097d35b93f5
                        • Opcode Fuzzy Hash: 16588d79e064be33b0955ab269401267c5d66f00aa31094a3ef177447a8a1426
                        • Instruction Fuzzy Hash: F6613F75900209AFCB14EF74DC88AED77BAFF48304F1445A9A94597390EB74AE44CFA0
                        APIs
                        • strlen.MSVCRT ref: 02D24B45
                        • strlen.MSVCRT ref: 02D24B6F
                          • Part of subcall function 02D08BE7: std::_Xinvalid_argument.LIBCPMT ref: 02D08BFD
                        • strlen.MSVCRT ref: 02D24BB4
                        • memcmp.MSVCRT(?,004351EC,?), ref: 02D24BEA
                          • Part of subcall function 02D08BE7: std::_Xinvalid_argument.LIBCPMT ref: 02D08C34
                          • Part of subcall function 02D08BE7: memcpy.MSVCRT(?,00000000,?,00000000,?,?,02D08A37,?,00000000,02D07AFE), ref: 02D08C92
                          • Part of subcall function 02D25AF7: memmove.MSVCRT(?,?,?,00000000), ref: 02D25B3E
                        • strlen.MSVCRT ref: 02D24EAE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: strlen$Xinvalid_argumentstd::_$memcmpmemcpymemmove
                        • String ID: Connection: UpgradeUpgrade: websocketSec-WebSocket-Key: $Sec-WebSocket-Version: 13$ HTTP/1.1Host: $:${"id":1,"method":"Storage.getCookies"}$QC
                        • API String ID: 3894209532-2441679285
                        • Opcode ID: 09200de26881e756e968cafb3f6607e7d6afed7e15c7dc6c433659dd52967857
                        • Instruction ID: 2b421319d626621a232d424c69bd05232d3e1c68bf9c1e296355814c573a3045
                        • Opcode Fuzzy Hash: 09200de26881e756e968cafb3f6607e7d6afed7e15c7dc6c433659dd52967857
                        • Instruction Fuzzy Hash: 60A26B71D012699FDB24DFA4D880BDDBBB6EF48304F5481AAD518A7390DB705E89CFA0
                        APIs
                        • wsprintfA.USER32 ref: 02D1D7B4
                        • FindFirstFileA.KERNEL32(?,?), ref: 02D1D7CB
                        • StrCmpCA.SHLWAPI(?,004317A0), ref: 02D1D7EB
                        • StrCmpCA.SHLWAPI(?,004317A4), ref: 02D1D805
                        • lstrcat.KERNEL32(?,00638D24), ref: 02D1D84A
                        • lstrcat.KERNEL32(?,00638BF8), ref: 02D1D85E
                        • lstrcat.KERNEL32(?,?), ref: 02D1D872
                        • lstrcat.KERNEL32(?,?), ref: 02D1D883
                        • lstrcat.KERNEL32(?,00431794), ref: 02D1D895
                        • lstrcat.KERNEL32(?,?), ref: 02D1D8A9
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1D8E9
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1D939
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D1D99E
                        • FindClose.KERNEL32(00000000), ref: 02D1D9AD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Find$Filelstrcpy$CloseFirstNextwsprintf
                        • String ID:
                        • API String ID: 50252434-0
                        • Opcode ID: 2f3143f31f884eba7a7c8b7dced017aca425ee65d456ec9c39855a417081a655
                        • Instruction ID: f1e2c50871909ad37da2a57e09abdc233a126daf311e3f511e2b4d2cf0a6bfe6
                        • Opcode Fuzzy Hash: 2f3143f31f884eba7a7c8b7dced017aca425ee65d456ec9c39855a417081a655
                        • Instruction Fuzzy Hash: 506155B5900219AFCB14EF74DC88ADDB7BAEF48304F108599E94997354EB74AE44CFA0
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 02D24920
                        • Process32First.KERNEL32(00000000,00000128), ref: 02D24930
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D24942
                        • StrCmpCA.SHLWAPI(?,?), ref: 02D24954
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24969
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24978
                        • CloseHandle.KERNEL32(00000000), ref: 02D2497F
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D2498D
                        • CloseHandle.KERNEL32(00000000), ref: 02D24998
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                        • String ID:
                        • API String ID: 3836391474-0
                        • Opcode ID: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                        • Instruction ID: 70b478d2a8c6464d02f581c1e525c602cc254ef5aa1c99b6318404035a9a6b99
                        • Opcode Fuzzy Hash: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                        • Instruction Fuzzy Hash: 23018431501224AFE7215B61DC89FFA777EEB44B55F00119CF905A6190EFB49944CFB1
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004246B9
                        • Process32First.KERNEL32(00000000,00000128), ref: 004246C9
                        • Process32Next.KERNEL32(00000000,00000128), ref: 004246DB
                        • StrCmpCA.SHLWAPI(?,?), ref: 004246ED
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00424702
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00424711
                        • CloseHandle.KERNEL32(00000000), ref: 00424718
                        • Process32Next.KERNEL32(00000000,00000128), ref: 00424726
                        • CloseHandle.KERNEL32(00000000), ref: 00424731
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                        • String ID:
                        • API String ID: 3836391474-0
                        • Opcode ID: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                        • Instruction ID: c0af82d2220ffa974d571ce9e7a5dccbaa51854a96d9eb04d24fe49588ec8ce6
                        • Opcode Fuzzy Hash: 31794d220843fc32869daf0815515cd9fdb01cafa73083098f7cfc23eab11e6d
                        • Instruction Fuzzy Hash: 4101A1316012246BE7205B60AC88FFB777DEB85B41F00009DF90592180EFB899408EB4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14DB8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14DDB
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D14DE6
                        • lstrlen.KERNEL32(00434CA4), ref: 02D14DF1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14E0E
                        • lstrcat.KERNEL32(00000000,00434CA4), ref: 02D14E1A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14E45
                        • FindFirstFileA.KERNEL32(00000000,?), ref: 02D14E61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FileFindFirstlstrlen
                        • String ID:
                        • API String ID: 2567437900-0
                        • Opcode ID: 0c8f911dd7eb7d508db889a4e1b985111a9b4ff907de9bb3503cd3c6a71a84cd
                        • Instruction ID: 015277de4d726edafe1297d325c4d57dea27add49f5e8276044731d55f06ee35
                        • Opcode Fuzzy Hash: 0c8f911dd7eb7d508db889a4e1b985111a9b4ff907de9bb3503cd3c6a71a84cd
                        • Instruction Fuzzy Hash: 2A31F775502656ABCB21AF68EDCCF9EB7A6EF40718F104124AC0497BA0DB74AC05CFA4
                        APIs
                          • Part of subcall function 02D27447: lstrcpy.KERNEL32(00000000,ERROR), ref: 02D27465
                        • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 02D23002
                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 02D23014
                        • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 02D23021
                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 02D23053
                        • LocalFree.KERNEL32(00000000), ref: 02D23231
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                        • String ID: /
                        • API String ID: 3090951853-4001269591
                        • Opcode ID: 6caac9e4e9da962acb08f16bfc44d7664d89c46914e57893374660aea1a7ed6d
                        • Instruction ID: 7b516c50dbb34e1eeb9391203164d97e84b5af2e30969a00b176ed626a1e1434
                        • Opcode Fuzzy Hash: 6caac9e4e9da962acb08f16bfc44d7664d89c46914e57893374660aea1a7ed6d
                        • Instruction Fuzzy Hash: 21B1F570900225CFD755CF58C948B99B7B2EF5432CF29C1A9D409AB3A1D77A9C8ACF90
                        APIs
                        • memset.MSVCRT ref: 02D0ECC2
                        • lstrlen.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 02D0ECDD
                        • CryptStringToBinaryA.CRYPT32(?,00000000,?,00000001,?,?,00000000), ref: 02D0ECE5
                        • memcpy.MSVCRT(?,?,?), ref: 02D0ED58
                        • lstrcat.KERNEL32(0042CFEC,0042CFEC), ref: 02D0ED8E
                        • lstrcat.KERNEL32(0042CFEC,0042CFEC), ref: 02D0EDB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                        • String ID:
                        • API String ID: 1498829745-0
                        • Opcode ID: aa36a3f23f2687ea5df4b75ef2fc322e42229470604d0d62d71fbb8e12f4794b
                        • Instruction ID: 1553256280f630f8a80da501b9e969f6b773187843ebe4682c9c11c630c79caf
                        • Opcode Fuzzy Hash: aa36a3f23f2687ea5df4b75ef2fc322e42229470604d0d62d71fbb8e12f4794b
                        • Instruction Fuzzy Hash: 1031A475B00229ABDB109B98EC85FEE777AEF44705F044169F909E2280DBB45A04CBE5
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000), ref: 02D2488F
                        • Process32First.KERNEL32(00000000,00000128), ref: 02D2489F
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D248B1
                        • StrCmpCA.SHLWAPI(?,0043507C), ref: 02D248C7
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D248D9
                        • CloseHandle.KERNEL32(00000000), ref: 02D248E4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$Next$CloseCreateFirstHandleSnapshotToolhelp32
                        • String ID:
                        • API String ID: 2284531361-0
                        • Opcode ID: bc1922ece39328686c400ed79e45fdf5ef3b47e6cc89be6fbc9388eb7eed7652
                        • Instruction ID: 1df102aa448c2c9ab2cc6560fff2d8bd47e788a6d80a0bbc50d28fd79598377e
                        • Opcode Fuzzy Hash: bc1922ece39328686c400ed79e45fdf5ef3b47e6cc89be6fbc9388eb7eed7652
                        • Instruction Fuzzy Hash: E4014F316112249BE7249B60EC89FEA77BDEF08754F040199FD08D2140EFB49E94CEE1
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?), ref: 02D22EA9
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D22EB0
                        • GetTimeZoneInformation.KERNEL32(?), ref: 02D22EBF
                        • wsprintfA.USER32 ref: 02D22EEA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                        • String ID: wwww
                        • API String ID: 3317088062-671953474
                        • Opcode ID: b0b5cb2ad12498860437fa942ab6e36db069a5d5969e1f97bbf7c175483cae77
                        • Instruction ID: 8a1cf52a8dc03177e526e6eabc9d55337e1979569f45fb36e22fe0f34e62a082
                        • Opcode Fuzzy Hash: b0b5cb2ad12498860437fa942ab6e36db069a5d5969e1f97bbf7c175483cae77
                        • Instruction Fuzzy Hash: F901F771A04614ABC71C8B58DC4AB69B76AEB85721F10432AFD16DB7C0D7B419048AE1
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 02D28669
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 02D2867E
                        • UnhandledExceptionFilter.KERNEL32(0042C290), ref: 02D28689
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 02D286A5
                        • TerminateProcess.KERNEL32(00000000), ref: 02D286AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 350a76b45aa3cd29fb9261b8fc249a567e8dcfeae3210acc4a4a42ce054e5037
                        • Instruction ID: c1ed57a612ff655be3e0c3ff447a98db8a372f320039deee5bda3688e6c4cd22
                        • Opcode Fuzzy Hash: 350a76b45aa3cd29fb9261b8fc249a567e8dcfeae3210acc4a4a42ce054e5037
                        • Instruction Fuzzy Hash: C921CFB5900306DFD761DF14F984A48BBB4FB28304F50606EF41887762EBB069898F6D
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,00000400), ref: 02D079C5
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D079CC
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 02D079F4
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 02D07A14
                        • LocalFree.KERNEL32(?), ref: 02D07A1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                        • String ID:
                        • API String ID: 2609814428-0
                        • Opcode ID: 6d1bfcca655919d7eab847b087b3d766d6f88c0200bb541f3522876a5bbf2ac9
                        • Instruction ID: de6554a03a95df3dd1ce4d32b5484571b8cad502c041f7fc484e00e9de037cef
                        • Opcode Fuzzy Hash: 6d1bfcca655919d7eab847b087b3d766d6f88c0200bb541f3522876a5bbf2ac9
                        • Instruction Fuzzy Hash: 6C011E75B44318BBEB14DBA49C4AFAA7779EB44B15F104159FB09EB2C0D7B0A900CBE4
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040775E
                        • HeapAlloc.KERNEL32(00000000), ref: 00407765
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040778D
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004077AD
                        • LocalFree.KERNEL32(?), ref: 004077B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                        • String ID:
                        • API String ID: 3657800372-0
                        • Opcode ID: 6d1bfcca655919d7eab847b087b3d766d6f88c0200bb541f3522876a5bbf2ac9
                        • Instruction ID: 1a725d20c68c60ec7f3e027db1d0bf620a8c7a6af013d4c7a88df0b6a2bd9b64
                        • Opcode Fuzzy Hash: 6d1bfcca655919d7eab847b087b3d766d6f88c0200bb541f3522876a5bbf2ac9
                        • Instruction Fuzzy Hash: 6A011275B44318BBEB14DB949C4AFAA7B79EB44B15F104159FA05EB2C0D6B0A900CBE4
                        APIs
                        • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 02D24334
                        • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 02D24343
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D2434A
                        • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 02D2437A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptHeapString$AllocateProcess
                        • String ID:
                        • API String ID: 3825993179-0
                        • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                        • Instruction ID: 9cf95839dd4be05ce61ee8e1a0198f7e13ee521eccca6e1aa218e53a61b86d89
                        • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                        • Instruction Fuzzy Hash: 74011A70600215ABDB14DFA5ED89BAABBADEF95315F105059FD4987340DB70DD40CBA0
                        APIs
                        • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 004240CD
                        • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004240DC
                        • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 004240E3
                        • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 00424113
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptHeapString$AllocProcess
                        • String ID:
                        • API String ID: 3939037734-0
                        • Opcode ID: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                        • Instruction ID: 804da95bf751652d27495f4eafff97b2fff01ecd0487fb5237b818349f7ed981
                        • Opcode Fuzzy Hash: 1654423fd72de82e54ce634d70b22f0d0a00e139ff6f7135eda8dce405f6aeb9
                        • Instruction Fuzzy Hash: FD011A70600215ABDB149FA5EC89BABBBAEEF85311F108159BE0987340DA719980CBA4
                        APIs
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 02D09E06
                        • LocalAlloc.KERNEL32(00000040,?), ref: 02D09E1A
                        • memcpy.MSVCRT(00000000,?), ref: 02D09E31
                        • LocalFree.KERNEL32(?), ref: 02D09E3E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                        • String ID:
                        • API String ID: 3243516280-0
                        • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                        • Instruction ID: 0cec3629af7e5eeb222207818d72ea4aaa81c732c6ac071d10e233a860a446b6
                        • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                        • Instruction Fuzzy Hash: AB011D75A41305AFD711DBA4DC59FAEB779EB44B00F108168FA04AB380DBB09E01CBE4
                        APIs
                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B9F
                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409BB3
                        • memcpy.MSVCRT(00000000,?), ref: 00409BCA
                        • LocalFree.KERNEL32(?), ref: 00409BD7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                        • String ID:
                        • API String ID: 3243516280-0
                        • Opcode ID: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                        • Instruction ID: a8d62dfbe6203375accfd57a9289b477ef975779ddea21d9cd908cb540d9be87
                        • Opcode Fuzzy Hash: d6986c5c4f938f64ac158f86dd5ebf18f182eae35123fd4b82889631517280d4
                        • Instruction Fuzzy Hash: 3101FB75A41309ABD7109BA4DC45BABB779EB44700F104169FA04AB381EBB4AE008BE5
                        APIs
                        • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 02D09DA2
                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 02D09DB1
                        • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,?,00000000,00000000), ref: 02D09DC8
                        • LocalFree.KERNEL32 ref: 02D09DD7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptLocalString$AllocFree
                        • String ID:
                        • API String ID: 4291131564-0
                        • Opcode ID: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                        • Instruction ID: 80f527f2d7d150f283a23ed55f9f06f66d49c1b58795d18fab6341af8209118c
                        • Opcode Fuzzy Hash: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                        • Instruction Fuzzy Hash: 8DF0D0703843126BF7305F65AC99FA67BA9EF04B51F240414FA49EA2D0D7F49840CBB4
                        APIs
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B3B
                        • LocalAlloc.KERNEL32(00000040,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B4A
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B61
                        • LocalFree.KERNEL32(?,?,00000000,00000001,00000000,?,00000000,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00409B70
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: BinaryCryptLocalString$AllocFree
                        • String ID:
                        • API String ID: 4291131564-0
                        • Opcode ID: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                        • Instruction ID: fdb19b52b522e7fb6258fb386c859728d3eb4189d8c812c623f7d3b132898295
                        • Opcode Fuzzy Hash: 52a740a2c3a0b915a6e879fc1adc512548ca54352df63306b7731fa0a6cd477b
                        • Instruction Fuzzy Hash: 89F0BD703443126BE7305F65AC49F577BA9EF04B61F240515FA45EA2D0D7B49C40CAA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 00423EA5
                        • lstrcpy.KERNEL32(00000000,02E197B0), ref: 00423ECF
                        • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00404DFA,?,00000014), ref: 00423ED9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$SystemTime
                        • String ID:
                        • API String ID: 684065273-0
                        • Opcode ID: 421262a5a8aa129839359d508a513974bb3d6816a57e51372254cceb0e03aba1
                        • Instruction ID: 22c005709d4f2ae5032b08e3382f49270a6c1388142e8724bcd7648d8fda4ab7
                        • Opcode Fuzzy Hash: 421262a5a8aa129839359d508a513974bb3d6816a57e51372254cceb0e03aba1
                        • Instruction Fuzzy Hash: 3441AE30A012158FCB14CF25E988666BBF5FF04315B4A84AEE845DB3A2C379DD42CB94
                        APIs
                        • CoCreateInstance.COMBASE(0042B110,00000000,00000001,0042B100,?), ref: 02D1CD6D
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104), ref: 02D1CDAD
                        • lstrcpyn.KERNEL32(?,?,00000104), ref: 02D1CE30
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ByteCharCreateInstanceMultiWidelstrcpyn
                        • String ID:
                        • API String ID: 1940255200-0
                        • Opcode ID: 356407dd27f615bd9d7e1c9fd377e8c2577ed93a8701771f82fb0a3cc92fc221
                        • Instruction ID: 0082ced4cf98b3ede1f74d86239eb76902c53104a996643504929ca6169bcb5c
                        • Opcode Fuzzy Hash: 356407dd27f615bd9d7e1c9fd377e8c2577ed93a8701771f82fb0a3cc92fc221
                        • Instruction Fuzzy Hash: C0315071A40614BFD710DB98DC81FAAB7B9EB88B14F504185BA04EB2D0D7B0AE45CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: .$GetProcAddress.$l
                        • API String ID: 0-2784972518
                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction ID: 8e308a592e0139ca1871c63a3890020d4a3436b4e2796f7a3645a016a0327c96
                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                        • Instruction Fuzzy Hash: 5A3149B6900609DFDB10CF99D880BAEBBF9FF48325F19404AD441A7360D7B1EA45CBA4
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00429737), ref: 02D299E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 252c4f8589a9a0e2aa22d50a9ad3e56f841633f2a9f172e4c294358fbd6cbf60
                        • Instruction ID: 87004856bd4916a3ff6221c23c88c6e19af1225d76bc7fe4a43c408fdd2626b1
                        • Opcode Fuzzy Hash: 252c4f8589a9a0e2aa22d50a9ad3e56f841633f2a9f172e4c294358fbd6cbf60
                        • Instruction Fuzzy Hash: 429002B03613108646111B706C0D506A7A09A88762FD108B56055C4094DB645445565D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651990781.0000000002DF9000.00000040.00000020.00020000.00000000.sdmp, Offset: 02DF9000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2df9000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction ID: e52be9ed110a430dc578652f980294a7236f586a6c1a40ec08391051687d8f11
                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction Fuzzy Hash: D4117C72740100AFDB84DE55DC90FE673EAEB89220B1A8065EE08CB316E676EC01CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction ID: e2b61c1dee467ded115664e0f08e156543bd28ca4518cb7d8a21f224583c208f
                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                        • Instruction Fuzzy Hash: 6601A776A106049FDF21CF24C844BAE33E5EB85217F4544A5D506973D2E774AD41CBA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: free
                        • String ID:
                        • API String ID: 1294909896-0
                        • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                        • Instruction ID: 4f1a5a5fb74b7302a0a361009b0ff83bd11e3cd6a29ce37baf92db9de409389a
                        • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                        • Instruction Fuzzy Hash: 12710631010B249BE7723B31DD01A6DF6BBFF22308F14691495D6227BC8A226D69DF71
                        APIs
                        • lstrcpy.KERNEL32(?), ref: 02D18911
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                        • StrStrA.SHLWAPI(?,00638C08), ref: 02D18936
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18955
                        • lstrlen.KERNEL32(?), ref: 02D18968
                        • wsprintfA.USER32 ref: 02D18978
                        • lstrcpy.KERNEL32(?,?), ref: 02D1898E
                        • StrStrA.SHLWAPI(?,00638C94), ref: 02D189BB
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D189E2
                        • lstrlen.KERNEL32(?), ref: 02D189F5
                        • wsprintfA.USER32 ref: 02D18A05
                        • lstrcpy.KERNEL32(?,006393D0), ref: 02D18A1B
                        • StrStrA.SHLWAPI(?,00638C5C), ref: 02D18A48
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18A67
                        • lstrlen.KERNEL32(?), ref: 02D18A7A
                        • wsprintfA.USER32 ref: 02D18A8A
                        • lstrcpy.KERNEL32(?,?), ref: 02D18AA0
                        • StrStrA.SHLWAPI(?,00638ABC), ref: 02D18ACD
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18AEC
                        • lstrlen.KERNEL32(?), ref: 02D18AFF
                        • wsprintfA.USER32 ref: 02D18B0F
                        • lstrcpy.KERNEL32(?,?), ref: 02D18B25
                        • StrStrA.SHLWAPI(?,00638AD0), ref: 02D18B52
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18B79
                        • lstrlen.KERNEL32(?), ref: 02D18B8C
                        • wsprintfA.USER32 ref: 02D18B9C
                        • lstrcpy.KERNEL32(?,006393D0), ref: 02D18BB2
                        • StrStrA.SHLWAPI(?,0063891C), ref: 02D18BDF
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18BFE
                        • lstrlen.KERNEL32(?), ref: 02D18C11
                        • wsprintfA.USER32 ref: 02D18C21
                        • lstrcpy.KERNEL32(?,?), ref: 02D18C37
                        • StrStrA.SHLWAPI(?,00638D3C), ref: 02D18C64
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18C83
                        • lstrlen.KERNEL32(?), ref: 02D18C96
                        • wsprintfA.USER32 ref: 02D18CA6
                        • lstrcpy.KERNEL32(?,?), ref: 02D18CBC
                        • StrStrA.SHLWAPI(?,00638B34), ref: 02D18CE9
                        • lstrcpyn.KERNEL32(006393D0,?,00000000), ref: 02D18D10
                        • lstrlen.KERNEL32(?), ref: 02D18D23
                        • wsprintfA.USER32 ref: 02D18D33
                        • lstrcpy.KERNEL32(?,006393D0), ref: 02D18D49
                        • lstrlen.KERNEL32(?), ref: 02D18D6E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D18DA3
                        • strtok_s.MSVCRT ref: 02D18EC1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcpynwsprintf$FolderPathstrtok_s
                        • String ID:
                        • API String ID: 2042561329-0
                        • Opcode ID: 18514cee2498f856c707f44b31815a1ad9abd94cfb5832b68fa0a969b094c959
                        • Instruction ID: 7eadd26b02ac06841b6ab90e27a0a3a32547df27429a747a6bb40bec33ed53ff
                        • Opcode Fuzzy Hash: 18514cee2498f856c707f44b31815a1ad9abd94cfb5832b68fa0a969b094c959
                        • Instruction Fuzzy Hash: E5E16FB1A05614AFDB10DB64DD48ADAB7BAEF88300F144199F909E7350DBB0AE05CFB0
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D02206
                        • lstrlen.KERNEL32(006389F0), ref: 02D02215
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D02242
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0224A
                        • lstrlen.KERNEL32(00431794), ref: 02D02255
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02275
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D02281
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D022A9
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D022B4
                        • lstrlen.KERNEL32(00431794), ref: 02D022BF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D022DC
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D022E8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02313
                        • lstrlen.KERNEL32(?), ref: 02D0234B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0236B
                        • lstrcat.KERNEL32(00000000,?), ref: 02D02379
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D023A0
                        • lstrlen.KERNEL32(00431794), ref: 02D023B2
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D023D2
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D023DE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02404
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0240F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0243B
                        • lstrlen.KERNEL32(?), ref: 02D02451
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02471
                        • lstrcat.KERNEL32(00000000,?), ref: 02D0247F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D024A9
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D024E6
                        • lstrlen.KERNEL32(00638CA4), ref: 02D024F4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02518
                        • lstrcat.KERNEL32(00000000,00638CA4), ref: 02D02520
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0255E
                        • lstrcat.KERNEL32(00000000), ref: 02D0256B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02594
                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02D025BD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D025E9
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D02626
                        • DeleteFileA.KERNEL32(00000000), ref: 02D0265E
                        • FindNextFileA.KERNEL32(00000000,?), ref: 02D026AB
                        • FindClose.KERNEL32(00000000), ref: 02D026BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$File$Find$CloseCopyDeleteNext
                        • String ID:
                        • API String ID: 2857443207-0
                        • Opcode ID: 3ef745759e559b95ce9c0926d959cffad3ceca5b2ca35f7e6a40af200e4673fc
                        • Instruction ID: af2e557a049e9e0c6683ef9ad933807efe08e84d18c2991df26d292e8b7109e9
                        • Opcode Fuzzy Hash: 3ef745759e559b95ce9c0926d959cffad3ceca5b2ca35f7e6a40af200e4673fc
                        • Instruction Fuzzy Hash: B9E1E575A026569BCB11AFB4CDCCB9EB7AAEF44308F148424AC05A73A0DB74DD05CFA4
                        APIs
                        • memset.MSVCRT ref: 004011AA
                          • Part of subcall function 00401120: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401135
                          • Part of subcall function 00401120: HeapAlloc.KERNEL32(00000000), ref: 0040113C
                          • Part of subcall function 00401120: RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401159
                          • Part of subcall function 00401120: RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401173
                          • Part of subcall function 00401120: RegCloseKey.ADVAPI32(?), ref: 0040117D
                        • lstrcatA.KERNEL32(?,00000000), ref: 004011C0
                        • lstrlenA.KERNEL32(?), ref: 004011CD
                        • lstrcatA.KERNEL32(?,.keys), ref: 004011E8
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 0040121F
                        • lstrlenA.KERNEL32(02E175E8), ref: 0040122D
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401251
                        • lstrcatA.KERNEL32(00000000,02E175E8), ref: 00401259
                        • lstrlenA.KERNEL32(\Monero\wallet.keys), ref: 00401264
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00401288
                        • lstrcatA.KERNEL32(00000000,\Monero\wallet.keys), ref: 00401294
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004012BA
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 004012FF
                        • lstrlenA.KERNEL32(02E1E008), ref: 0040130E
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401335
                        • lstrcatA.KERNEL32(00000000,?), ref: 0040133D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00401378
                        • lstrcatA.KERNEL32(00000000), ref: 00401385
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004013AC
                        • CopyFileA.KERNEL32(?,?,00000001), ref: 004013D5
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401401
                        • lstrcpy.KERNEL32(00000000,?), ref: 0040143D
                          • Part of subcall function 0041EDE0: lstrcpy.KERNEL32(00000000,?), ref: 0041EE12
                        • DeleteFileA.KERNEL32(?), ref: 00401471
                        • memset.MSVCRT ref: 0040148E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocCloseCopyDeleteOpenProcessQueryValue
                        • String ID: .keys$\Monero\wallet.keys
                        • API String ID: 2734118222-3586502688
                        • Opcode ID: d193e21760b913851f032afc158483612852c13e12e6026be582793bec16aa20
                        • Instruction ID: 5b1f9cedebb7301d79ff4b17b31e59388bd9e0eda9de9398fffc4fbee8d4e41d
                        • Opcode Fuzzy Hash: d193e21760b913851f032afc158483612852c13e12e6026be582793bec16aa20
                        • Instruction Fuzzy Hash: CBA15C71B102059BCB21ABB9DD89A9F77B9AF44304F04107AF905F72E1DB78DD058BA8
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D15A3C
                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02D15A6B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15A9C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15AC4
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D15ACF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15AF7
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15B2F
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D15B3A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15B5F
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D15B95
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15BBD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D15BC8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15BEF
                        • lstrlen.KERNEL32(00431794), ref: 02D15C01
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15C20
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D15C2C
                        • lstrlen.KERNEL32(00638DD8), ref: 02D15C3B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15C5E
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D15C69
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15C93
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15CBF
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D15CC6
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D15D1E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D15D94
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D15DBD
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D15DF0
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15E1C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D15E56
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D15EB3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D15ED7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$AttributesFileFolderPath
                        • String ID:
                        • API String ID: 2428362635-0
                        • Opcode ID: eca8acabcf741f8b3cf38b95802c8dd6a918646a14f7c24f35edd9d23cabb5b5
                        • Instruction ID: 4edd79c7d453743d102c633c0f622176ad91bddcaa91505a0bf4d683f1fc4927
                        • Opcode Fuzzy Hash: eca8acabcf741f8b3cf38b95802c8dd6a918646a14f7c24f35edd9d23cabb5b5
                        • Instruction Fuzzy Hash: 87026371A01246ABCB21AF74EDCCA9EBBB6EF44304F544428E80597790DB78DD45CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D166AC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D166E7
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D16711
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D16748
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1676D
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D16775
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1679E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$FolderPathlstrcat
                        • String ID:
                        • API String ID: 2938889746-0
                        • Opcode ID: 5065eb540a5537ba5602e15ae87ae4d3f8e8da563b7481b3c869affb913a7e6a
                        • Instruction ID: 2d30d751c2b5c41e12ae4e65473e460c4216260001032d7fe555c94f77ce42fa
                        • Opcode Fuzzy Hash: 5065eb540a5537ba5602e15ae87ae4d3f8e8da563b7481b3c869affb913a7e6a
                        • Instruction Fuzzy Hash: 68F16270A01656ABCB11AF74DC8CBADBBAAEF04304F148468E81597BA4DB74DC45CFE0
                        APIs
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638DC8), ref: 02D26650
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638E44), ref: 02D26669
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638A64), ref: 02D26681
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638A50), ref: 02D26699
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638AF8), ref: 02D266B2
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638CD4), ref: 02D266CA
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638B3C), ref: 02D266E2
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638DA0), ref: 02D266FB
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638D48), ref: 02D26713
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638BBC), ref: 02D2672B
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638AE8), ref: 02D26744
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,00638E0C), ref: 02D2675C
                          • Part of subcall function 02D265F7: GetProcAddress.KERNEL32(006390E0,006388B0), ref: 02D26774
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D21E96
                        • ExitProcess.KERNEL32 ref: 02D21ECE
                        • GetSystemInfo.KERNEL32(?), ref: 02D21ED8
                        • ExitProcess.KERNEL32 ref: 02D21EE6
                          • Part of subcall function 02D01297: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 02D012AD
                          • Part of subcall function 02D01297: VirtualAllocExNuma.KERNEL32(00000000), ref: 02D012B4
                          • Part of subcall function 02D01297: ExitProcess.KERNEL32 ref: 02D012BF
                          • Part of subcall function 02D01327: GlobalMemoryStatusEx.KERNEL32 ref: 02D01351
                          • Part of subcall function 02D01327: ExitProcess.KERNEL32 ref: 02D0137B
                        • GetUserDefaultLangID.KERNEL32 ref: 02D21EF6
                        • ExitProcess.KERNEL32 ref: 02D21F48
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$Process$Exit$AllocCurrentDefaultGlobalInfoLangMemoryNumaStatusSystemUserVirtuallstrcpy
                        • String ID:
                        • API String ID: 1589815927-0
                        • Opcode ID: c9abc042eacc02d025ee3f4a719d2fd45bea0eec9f21e56f57314178547b8acb
                        • Instruction ID: af2b5010ecf5eb82460b63f4535fed43ef37ea43121c2a55b00fc1fecfd94412
                        • Opcode Fuzzy Hash: c9abc042eacc02d025ee3f4a719d2fd45bea0eec9f21e56f57314178547b8acb
                        • Instruction Fuzzy Hash: 21718F315012269BDB20ABB0DD8CBAE7AABEF55749F145028F905972A4DF74DC09CFB0
                        APIs
                          • Part of subcall function 004090C0: InternetOpenA.WININET(Function_0002CFEC,00000001,00000000,00000000,00000000), ref: 004090DF
                          • Part of subcall function 004090C0: InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 004090FC
                          • Part of subcall function 004090C0: InternetCloseHandle.WININET(00000000), ref: 00409109
                          • Part of subcall function 004090C0: strlen.MSVCRT ref: 00409125
                        • strlen.MSVCRT ref: 004092E1
                        • strlen.MSVCRT ref: 004092FA
                          • Part of subcall function 00417E30: memchr.MSVCRT ref: 00417E6F
                          • Part of subcall function 00417E30: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417E89
                          • Part of subcall function 00417E30: memchr.MSVCRT ref: 00417EA8
                          • Part of subcall function 00408980: std::_Xinvalid_argument.LIBCPMT ref: 00408996
                        • memset.MSVCRT ref: 00409341
                        • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 0040935C
                        • lstrcatA.KERNEL32(?,00000000), ref: 00409372
                        • strlen.MSVCRT ref: 00409399
                        • strlen.MSVCRT ref: 004093E6
                        • memcmp.MSVCRT(?,Function_0002CFEC,?), ref: 0040940B
                        • memset.MSVCRT ref: 00409532
                        • lstrcatA.KERNEL32(?,cookies), ref: 00409547
                        • lstrcatA.KERNEL32(?,00431794), ref: 00409559
                        • lstrcatA.KERNEL32(?,?), ref: 0040956A
                        • lstrcatA.KERNEL32(?,00434B98), ref: 0040957C
                        • lstrcatA.KERNEL32(?,?), ref: 0040958D
                        • lstrcatA.KERNEL32(?,.txt), ref: 0040959F
                        • lstrlenA.KERNEL32(?), ref: 004095B6
                        • lstrlenA.KERNEL32(?), ref: 004095DB
                        • lstrcpy.KERNEL32(00000000,?), ref: 00409614
                        • memset.MSVCRT ref: 0040965C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$strlen$Internetmemset$Openlstrlenmemchrmemcmp$CloseHandleXinvalid_argumentlstrcpystd::_
                        • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                        • API String ID: 2819545660-3542011879
                        • Opcode ID: d48637b6719d8f96c9213796787e210675e0996336a527ebb663fddc1dbdf154
                        • Instruction ID: 14f5b6a0603da56145a1f149ec3f4ec4d562d20c5ba75c6a8b5cb729d4dfbb0d
                        • Opcode Fuzzy Hash: d48637b6719d8f96c9213796787e210675e0996336a527ebb663fddc1dbdf154
                        • Instruction Fuzzy Hash: 53E11771E00218DBDF14DFA9D984ADEBBB5BF48304F10446AE509B7281DB78AE45CF98
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1460A
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1463D
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14665
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D14670
                        • lstrlen.KERNEL32(00434CF0), ref: 02D1467B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14698
                        • lstrcat.KERNEL32(00000000,00434CF0), ref: 02D146A4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D146CD
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D146D8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D146FF
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1473E
                        • lstrcat.KERNEL32(00000000,?), ref: 02D14746
                        • lstrlen.KERNEL32(00431794), ref: 02D14751
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1476E
                        • lstrcat.KERNEL32(00000000,00431794), ref: 02D1477A
                        • lstrlen.KERNEL32(00434D04), ref: 02D14785
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D147A2
                        • lstrcat.KERNEL32(00000000,00434D04), ref: 02D147AE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D147D5
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14807
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D1480E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14868
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14891
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D148BA
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D148E2
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14916
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$AttributesFile
                        • String ID:
                        • API String ID: 1033685851-0
                        • Opcode ID: 0ad0913afd8c1328d1a6b66bdd8b7e16a2ecb3d1e858f4ecd6d31718e7f09922
                        • Instruction ID: ddbf29b244aa2c15a6a303edf433bdbfd688e75e0ebbee821de8ee77bac8aec8
                        • Opcode Fuzzy Hash: 0ad0913afd8c1328d1a6b66bdd8b7e16a2ecb3d1e858f4ecd6d31718e7f09922
                        • Instruction Fuzzy Hash: 0DB14175A02696ABCB11AF74DD8CAAE77AAEF04708F144524E805E77A0DB74DC04CFA4
                        APIs
                        • lstrcpy.KERNEL32 ref: 02D1AE36
                        • lstrlen.KERNEL32(00638DD4), ref: 02D1AE4C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AE74
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1AE7F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AEA8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AEEB
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1AEF5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AF1E
                        • lstrlen.KERNEL32(00434AD4), ref: 02D1AF38
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AF5A
                        • lstrcat.KERNEL32(00000000,00434AD4), ref: 02D1AF66
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AF8F
                        • lstrlen.KERNEL32(00434AD4), ref: 02D1AFA1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AFC3
                        • lstrcat.KERNEL32(00000000,00434AD4), ref: 02D1AFCF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1AFF8
                        • lstrlen.KERNEL32(00638DB8), ref: 02D1B00E
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1B036
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1B041
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1B06A
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1B0A6
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1B0B0
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1B0D6
                        • lstrlen.KERNEL32(00000000), ref: 02D1B0EC
                        • lstrcpy.KERNEL32(00000000,00638A98), ref: 02D1B11F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen
                        • String ID: f
                        • API String ID: 2762123234-1993550816
                        • Opcode ID: 188521429213a4490580d65eede3cbdd68b32f9f61f7551c6e75461d2c3815fe
                        • Instruction ID: 01b25f54037ecf90d3e0c31ad58fdbb1e368ff75a7d59dc8a96ba93377d82051
                        • Opcode Fuzzy Hash: 188521429213a4490580d65eede3cbdd68b32f9f61f7551c6e75461d2c3815fe
                        • Instruction Fuzzy Hash: F6B13C75902616ABCB11AF64DC8CBAEB7B6EF45308F144525E814A7BA0EB74DD04CFA0
                        APIs
                        • lstrcat.KERNEL32(?,?), ref: 02D09A07
                        • lstrcat.KERNEL32(?,?), ref: 02D09A18
                        • lstrcat.KERNEL32(?,00434BA4), ref: 02D09A2A
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • wsprintfA.USER32 ref: 02D09A6D
                        • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 02D09A8E
                        • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 02D09AAB
                          • Part of subcall function 02D24907: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 02D24920
                          • Part of subcall function 02D24907: Process32First.KERNEL32(00000000,00000128), ref: 02D24930
                          • Part of subcall function 02D24907: Process32Next.KERNEL32(00000000,00000128), ref: 02D24942
                          • Part of subcall function 02D24907: StrCmpCA.SHLWAPI(?,?), ref: 02D24954
                          • Part of subcall function 02D24907: OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24969
                          • Part of subcall function 02D24907: TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24978
                          • Part of subcall function 02D24907: CloseHandle.KERNEL32(00000000), ref: 02D2497F
                          • Part of subcall function 02D24907: Process32Next.KERNEL32(00000000,00000128), ref: 02D2498D
                          • Part of subcall function 02D24907: CloseHandle.KERNEL32(00000000), ref: 02D24998
                        • memset.MSVCRT ref: 02D09AC9
                        • lstrcat.KERNEL32(00000000,?), ref: 02D09ADF
                        • lstrcat.KERNEL32(00000000,?), ref: 02D09AF0
                        • lstrcat.KERNEL32(00000000,00434B60), ref: 02D09B02
                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02D09B3B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D09B6A
                        • StrStrA.SHLWAPI(00000000,00638C5C), ref: 02D09B80
                        • lstrcpyn.KERNEL32(006393D0,00000000,00000000), ref: 02D09B9F
                        • lstrlen.KERNEL32(?), ref: 02D09BB2
                        • wsprintfA.USER32 ref: 02D09BC2
                        • lstrcpy.KERNEL32(?,00000000), ref: 02D09BD8
                        • memset.MSVCRT ref: 02D09BED
                        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 02D09C3F
                        • Sleep.KERNEL32(00001388), ref: 02D09C4E
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                          • Part of subcall function 02D249A7: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 02D249C0
                          • Part of subcall function 02D249A7: Process32First.KERNEL32(00000000,00000128), ref: 02D249D0
                          • Part of subcall function 02D249A7: Process32Next.KERNEL32(00000000,00000128), ref: 02D249E2
                          • Part of subcall function 02D249A7: OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24A03
                          • Part of subcall function 02D249A7: TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24A12
                          • Part of subcall function 02D249A7: CloseHandle.KERNEL32(00000000), ref: 02D24A19
                          • Part of subcall function 02D249A7: Process32Next.KERNEL32(00000000,00000128), ref: 02D24A27
                          • Part of subcall function 02D249A7: CloseHandle.KERNEL32(00000000), ref: 02D24A32
                        • CloseDesktop.USER32(?), ref: 02D09C83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Process32lstrcat$CloseProcess$CreateHandleNext$DesktopOpen$FirstSnapshotTerminateToolhelp32memsetwsprintf$FolderPathSleepSystemTimelstrcpynlstrlen
                        • String ID: D
                        • API String ID: 3267785154-2746444292
                        • Opcode ID: ffa00ccfa7c873f4eaa158a8fcc16a514a9672285c81674f977830100ce25e53
                        • Instruction ID: c33423bb84e334d5b70a7a060ed6121c1eb3d649d1238ed4a0fa1a67e802db85
                        • Opcode Fuzzy Hash: ffa00ccfa7c873f4eaa158a8fcc16a514a9672285c81674f977830100ce25e53
                        • Instruction Fuzzy Hash: 54915375900218AFDB14DB64DC89FDEB7B9EF48704F108599FA0997290DBB0AE44CFA4
                        APIs
                        • lstrcat.KERNEL32(?,?), ref: 02D09A07
                        • lstrcat.KERNEL32(?,?), ref: 02D09A18
                        • lstrcat.KERNEL32(?,00434BA4), ref: 02D09A2A
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • wsprintfA.USER32 ref: 02D09A6D
                        • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 02D09A8E
                        • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 02D09AAB
                          • Part of subcall function 02D24907: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 02D24920
                          • Part of subcall function 02D24907: Process32First.KERNEL32(00000000,00000128), ref: 02D24930
                          • Part of subcall function 02D24907: Process32Next.KERNEL32(00000000,00000128), ref: 02D24942
                          • Part of subcall function 02D24907: StrCmpCA.SHLWAPI(?,?), ref: 02D24954
                          • Part of subcall function 02D24907: OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24969
                          • Part of subcall function 02D24907: TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24978
                          • Part of subcall function 02D24907: CloseHandle.KERNEL32(00000000), ref: 02D2497F
                          • Part of subcall function 02D24907: Process32Next.KERNEL32(00000000,00000128), ref: 02D2498D
                          • Part of subcall function 02D24907: CloseHandle.KERNEL32(00000000), ref: 02D24998
                        • memset.MSVCRT ref: 02D09AC9
                        • lstrcat.KERNEL32(00000000,?), ref: 02D09ADF
                        • lstrcat.KERNEL32(00000000,?), ref: 02D09AF0
                        • lstrcat.KERNEL32(00000000,00434B60), ref: 02D09B02
                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02D09B3B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D09B6A
                        • StrStrA.SHLWAPI(00000000,00638C5C), ref: 02D09B80
                        • lstrcpyn.KERNEL32(006393D0,00000000,00000000), ref: 02D09B9F
                        • lstrlen.KERNEL32(?), ref: 02D09BB2
                        • wsprintfA.USER32 ref: 02D09BC2
                        • lstrcpy.KERNEL32(?,00000000), ref: 02D09BD8
                        • memset.MSVCRT ref: 02D09BED
                        • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 02D09C3F
                        • Sleep.KERNEL32(00001388), ref: 02D09C4E
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                          • Part of subcall function 02D249A7: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 02D249C0
                          • Part of subcall function 02D249A7: Process32First.KERNEL32(00000000,00000128), ref: 02D249D0
                          • Part of subcall function 02D249A7: Process32Next.KERNEL32(00000000,00000128), ref: 02D249E2
                          • Part of subcall function 02D249A7: OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24A03
                          • Part of subcall function 02D249A7: TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24A12
                          • Part of subcall function 02D249A7: CloseHandle.KERNEL32(00000000), ref: 02D24A19
                          • Part of subcall function 02D249A7: Process32Next.KERNEL32(00000000,00000128), ref: 02D24A27
                          • Part of subcall function 02D249A7: CloseHandle.KERNEL32(00000000), ref: 02D24A32
                        • CloseDesktop.USER32(?), ref: 02D09C83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Process32lstrcat$CloseProcess$CreateHandleNext$DesktopOpen$FirstSnapshotTerminateToolhelp32memsetwsprintf$FolderPathSleepSystemTimelstrcpynlstrlen
                        • String ID: D
                        • API String ID: 3267785154-2746444292
                        • Opcode ID: c8b9cdd6addf4576e781366e8a69b0aa9a5a56e3c77a009e668f4170de131511
                        • Instruction ID: 31577c939870a2a584cf1c83b0c6234ef87840896bde7b16d8550a910c594abe
                        • Opcode Fuzzy Hash: c8b9cdd6addf4576e781366e8a69b0aa9a5a56e3c77a009e668f4170de131511
                        • Instruction Fuzzy Hash: 13914375900218AFDB10DB64DC89FDEB7B9EF48704F108199F50997290DBB1AE44CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0042184F
                        • lstrlenA.KERNEL32(02DF40E0,00000000,00000000,?,?,00421B81), ref: 00421860
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421887
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 00421892
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004218C1
                        • lstrlenA.KERNEL32(00434F9C,?,?,00421B81), ref: 004218D3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004218F4
                        • lstrcatA.KERNEL32(00000000,00434F9C,?,?,00421B81), ref: 00421900
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0042192F
                        • lstrlenA.KERNEL32(02DF4100,?,?,00421B81), ref: 00421945
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0042196C
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 00421977
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004219A6
                        • lstrlenA.KERNEL32(00434F9C,?,?,00421B81), ref: 004219B8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004219D9
                        • lstrcatA.KERNEL32(00000000,00434F9C,?,?,00421B81), ref: 004219E5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A14
                        • lstrlenA.KERNEL32(02DF4120,?,?,00421B81), ref: 00421A2A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A51
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 00421A5C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421A8B
                        • lstrlenA.KERNEL32(02DF4080,?,?,00421B81), ref: 00421AA1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421AC8
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 00421AD3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00421B02
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcatlstrlen
                        • String ID:
                        • API String ID: 1049500425-0
                        • Opcode ID: 2e7111f3e1e8d831c03b92a1e92bedf09d5f685c95c5d4d8b02b1b18e4c2687d
                        • Instruction ID: 3fd8cf0d8fe79b35c8f59d64ffc5d3ace3c11d514ec93a2171918c99a43e8bb8
                        • Opcode Fuzzy Hash: 2e7111f3e1e8d831c03b92a1e92bedf09d5f685c95c5d4d8b02b1b18e4c2687d
                        • Instruction Fuzzy Hash: 979120B07017039BD720AFB9DD88A17B7E9AF14344B54543EB886D33A1DB78D845CB64
                        APIs
                        • memset.MSVCRT ref: 02D01411
                          • Part of subcall function 02D01387: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0139C
                          • Part of subcall function 02D01387: RtlAllocateHeap.NTDLL(00000000), ref: 02D013A3
                          • Part of subcall function 02D01387: RegOpenKeyExA.ADVAPI32(80000001,00431754,00000000,00020119,?), ref: 02D013C0
                          • Part of subcall function 02D01387: RegQueryValueExA.ADVAPI32(?,00431748,00000000,00000000,00000000,000000FF), ref: 02D013DA
                          • Part of subcall function 02D01387: RegCloseKey.ADVAPI32(?), ref: 02D013E4
                        • lstrcat.KERNEL32(?,00000000), ref: 02D01427
                        • lstrlen.KERNEL32(?), ref: 02D01434
                        • lstrcat.KERNEL32(?,00431778), ref: 02D0144F
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01486
                        • lstrlen.KERNEL32(006389F0), ref: 02D01494
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D014B8
                        • lstrcat.KERNEL32(00000000,006389F0), ref: 02D014C0
                        • lstrlen.KERNEL32(00431780), ref: 02D014CB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D014EF
                        • lstrcat.KERNEL32(00000000,00431780), ref: 02D014FB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01521
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D01566
                        • lstrlen.KERNEL32(00638CA4), ref: 02D01575
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D0159C
                        • lstrcat.KERNEL32(00000000,?), ref: 02D015A4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D015DF
                        • lstrcat.KERNEL32(00000000), ref: 02D015EC
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D01613
                        • CopyFileA.KERNEL32(?,?,00000001), ref: 02D0163C
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01668
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D016A4
                          • Part of subcall function 02D1F047: lstrcpy.KERNEL32(00000000,?), ref: 02D1F079
                        • DeleteFileA.KERNEL32(?), ref: 02D016D8
                        • memset.MSVCRT ref: 02D016F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocateCloseCopyDeleteOpenProcessQueryValue
                        • String ID:
                        • API String ID: 1397529057-0
                        • Opcode ID: 4c77c06fc6bfbf7e2885e90edbd79799df700ef0be800a0fa542113122d01cbf
                        • Instruction ID: 267c81aed942a854308250a0bbff6f458a40c118d9e1b96e194db39145e87146
                        • Opcode Fuzzy Hash: 4c77c06fc6bfbf7e2885e90edbd79799df700ef0be800a0fa542113122d01cbf
                        • Instruction Fuzzy Hash: 4DA11B75A012569BCB11ABB4CDCCB9EBBBAEF44304F544428E909A73A0DB74DD05CFA4
                        APIs
                        • StrCmpCA.SHLWAPI(?,block,?,00000000,?,?,0042079B), ref: 00418CBA
                        • ExitProcess.KERNEL32 ref: 00418CC7
                        • strtok_s.MSVCRT ref: 00418CD9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcessstrtok_s
                        • String ID: block
                        • API String ID: 3407564107-2199623458
                        • Opcode ID: 3389e23817480750e9328c393260997ebb1d046b1e32a7a93ed99d3895b4b957
                        • Instruction ID: 8a8c59f1aab1cb96be6784030a5ca16aa0355bed4485c802314b17a26c7986f2
                        • Opcode Fuzzy Hash: 3389e23817480750e9328c393260997ebb1d046b1e32a7a93ed99d3895b4b957
                        • Instruction Fuzzy Hash: CD518A70A00701EFCB209F75DD88AAB77F4BB55B05B10182EE442D6650DBBCE6818FA9
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D21AB6
                        • lstrlen.KERNEL32(00638DEC), ref: 02D21AC7
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21AEE
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D21AF9
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B28
                        • lstrlen.KERNEL32(00434F9C), ref: 02D21B3A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B5B
                        • lstrcat.KERNEL32(00000000,00434F9C), ref: 02D21B67
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B96
                        • lstrlen.KERNEL32(00638B1C), ref: 02D21BAC
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21BD3
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D21BDE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21C0D
                        • lstrlen.KERNEL32(00434F9C), ref: 02D21C1F
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21C40
                        • lstrcat.KERNEL32(00000000,00434F9C), ref: 02D21C4C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21C7B
                        • lstrlen.KERNEL32(00638D70), ref: 02D21C91
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21CB8
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D21CC3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21CF2
                        • lstrlen.KERNEL32(00638D6C), ref: 02D21D08
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21D2F
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D21D3A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21D69
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcatlstrlen
                        • String ID:
                        • API String ID: 1049500425-0
                        • Opcode ID: 8da9be1777f01efb1075c843e8ebc578fd0baf71eb8635b7467494a2e4d9551d
                        • Instruction ID: 6d6e4f5ccb26d9555ed102974d2b207a5acc8e2f2207e6876a6ded03ed224ac7
                        • Opcode Fuzzy Hash: 8da9be1777f01efb1075c843e8ebc578fd0baf71eb8635b7467494a2e4d9551d
                        • Instruction Fuzzy Hash: 8B912CB46017439BD7209FB9CCC8A56B7EAEF14308F149829A885D33A1DB74EC44DF60
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D149FA
                        • LocalAlloc.KERNEL32(00000040,?), ref: 02D14A2C
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14A79
                        • lstrlen.KERNEL32(00434B60), ref: 02D14A84
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14AA1
                        • lstrcat.KERNEL32(00000000,00434B60), ref: 02D14AAD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14AD2
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14AFF
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D14B0A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D14B31
                        • StrStrA.SHLWAPI(?,00000000), ref: 02D14B43
                        • lstrlen.KERNEL32(?), ref: 02D14B57
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D14B98
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14C1F
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14C48
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14C71
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14C97
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D14CC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcatlstrlen$AllocLocal
                        • String ID: ^userContextId=4294967295$moz-extension+++
                        • API String ID: 4107348322-3310892237
                        • Opcode ID: e6b0a6810cf6c4817a04f1c06385c3c7de7a39cac9f460d4a23f626d9d261afc
                        • Instruction ID: 9a4fabc628c16b9468b1625ff09152db42e3f2b8f967874ef06cc61e9c1057be
                        • Opcode Fuzzy Hash: e6b0a6810cf6c4817a04f1c06385c3c7de7a39cac9f460d4a23f626d9d261afc
                        • Instruction Fuzzy Hash: 46B15375A012469BCB21EF74DD8CAAEB7A6EF44308F154528EC05A77A0DB74EC05CFA4
                        APIs
                        • lstrlen.KERNEL32(00638DB4), ref: 02D1F57C
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F60A
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1F62E
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1F6E2
                        • lstrcpy.KERNEL32(00000000,00638DB4), ref: 02D1F722
                        • lstrcpy.KERNEL32(00000000,00638C7C), ref: 02D1F751
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1F805
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 02D1F883
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F8B3
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F901
                        • StrCmpCA.SHLWAPI(?,ERROR), ref: 02D1F97F
                        • lstrlen.KERNEL32(00638DBC), ref: 02D1F9AD
                        • lstrcpy.KERNEL32(00000000,00638DBC), ref: 02D1F9D8
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1F9FA
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1FA4B
                        • StrCmpCA.SHLWAPI(?,ERROR), ref: 02D1FC99
                        • lstrlen.KERNEL32(00638BB0), ref: 02D1FCC7
                        • lstrcpy.KERNEL32(00000000,00638BB0), ref: 02D1FCF2
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1FD14
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1FD65
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen
                        • String ID: ERROR
                        • API String ID: 367037083-2861137601
                        • Opcode ID: 78d466b8400d021d7ee17127ce33daffecfa7c9ea5ffd4626243dbc5c437b959
                        • Instruction ID: b4f33a4c607ad154d795bcd1ee5f614069eba257fb0aa22d45b05f4ba7592f38
                        • Opcode Fuzzy Hash: 78d466b8400d021d7ee17127ce33daffecfa7c9ea5ffd4626243dbc5c437b959
                        • Instruction Fuzzy Hash: D3F13F70901301AFDB24DF29E988B69B7E6BF44318B1980ADD8099BBA5D775DC41CF90
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D06ED6
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D06F29
                        • InternetOpenA.WININET(0042CFEC,00000001,00000000,00000000,00000000), ref: 02D06F3C
                        • StrCmpCA.SHLWAPI(?,00638C80), ref: 02D06F54
                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02D06F7C
                        • HttpOpenRequestA.WININET(00000000,00434AB8,?,00638AB4,00000000,00000000,-00400100,00000000), ref: 02D06FB7
                        • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 02D06FDE
                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02D06FED
                        • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 02D0700C
                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02D07066
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D070C2
                        • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 02D070E4
                        • InternetCloseHandle.WININET(00000000), ref: 02D070F5
                        • InternetCloseHandle.WININET(?), ref: 02D070FF
                        • InternetCloseHandle.WININET(00000000), ref: 02D07109
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0712A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                        • String ID: ERROR
                        • API String ID: 3687753495-2861137601
                        • Opcode ID: be4a6029b89d9d25312199273e0c195fbbd3ab5660e111022585323f103fa897
                        • Instruction ID: 95eaeef9641c7e211f65f8354cd493f8a1dcad4ddbba3907d675fc3b472d3792
                        • Opcode Fuzzy Hash: be4a6029b89d9d25312199273e0c195fbbd3ab5660e111022585323f103fa897
                        • Instruction Fuzzy Hash: 98814F71A41215ABEB20DFA4DC89FAEB7B9EB44704F144158F904EB3D0DB74AD05CBA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C0BA
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C0ED
                        • lstrlen.KERNEL32(00434E0C), ref: 02D1C0F8
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C118
                        • lstrcat.KERNEL32(00000000,00434E0C), ref: 02D1C124
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C147
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D1C152
                        • lstrlen.KERNEL32(00434E44), ref: 02D1C15D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C17A
                        • lstrcat.KERNEL32(00000000,00434E44), ref: 02D1C186
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C1AD
                        • lstrlen.KERNEL32(00434E48), ref: 02D1C1CD
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C1EF
                        • lstrcat.KERNEL32(00000000,00434E48), ref: 02D1C1FB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C221
                        • ShellExecuteEx.SHELL32(?), ref: 02D1C273
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$lstrlen$ExecuteShell
                        • String ID: <
                        • API String ID: 4016326548-4251816714
                        • Opcode ID: bd190b5355103f1feb2b178c731c226eef8df389d1643616fb22025323836631
                        • Instruction ID: fd693c1f7ca96c760d6f28edd25ccc4ec94ad0c90649df64cd938beee11811d0
                        • Opcode Fuzzy Hash: bd190b5355103f1feb2b178c731c226eef8df389d1643616fb22025323836631
                        • Instruction Fuzzy Hash: 8761B371A51256ABCB11AFB49CCCB9EBBAAEF04708F14442AE805E3750DB74CD05CFA5
                        APIs
                        • InternetOpenA.WININET(Function_0002CFEC,00000001,00000000,00000000,00000000), ref: 004090DF
                        • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 004090FC
                        • InternetCloseHandle.WININET(00000000), ref: 00409109
                        • strlen.MSVCRT ref: 00409125
                        • InternetReadFile.WININET(?,?,?,00000000), ref: 00409166
                        • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00409197
                        • InternetCloseHandle.WININET(00000000), ref: 004091A2
                        • InternetCloseHandle.WININET(00000000), ref: 004091A9
                        • strlen.MSVCRT ref: 004091BA
                        • strlen.MSVCRT ref: 004091ED
                        • strlen.MSVCRT ref: 0040922E
                          • Part of subcall function 00417E30: memchr.MSVCRT ref: 00417E6F
                          • Part of subcall function 00417E30: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00417E89
                          • Part of subcall function 00417E30: memchr.MSVCRT ref: 00417EA8
                        • strlen.MSVCRT ref: 0040924C
                          • Part of subcall function 00408980: std::_Xinvalid_argument.LIBCPMT ref: 00408996
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$strlen$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_
                        • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                        • API String ID: 4166274400-2144369209
                        • Opcode ID: f484861ef0c5ede018d2fa63b64603f0a41ca3c7f998b9b087b6275257805ea8
                        • Instruction ID: e08c98b3f93959a00be7363e8d9b96c6255ff75e03ad9d626c644cea6eb1cb17
                        • Opcode Fuzzy Hash: f484861ef0c5ede018d2fa63b64603f0a41ca3c7f998b9b087b6275257805ea8
                        • Instruction Fuzzy Hash: 4251A571700205ABE720DBA5DC45BDEF7FADB48710F14016AF905E72C1DBB8AA448BA9
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0B597
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B5E5
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B610
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0B618
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B640
                        • lstrlen.KERNEL32(00434C4C), ref: 02D0B6B7
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B6DB
                        • lstrcat.KERNEL32(00000000,00434C4C), ref: 02D0B6E7
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B710
                        • lstrlen.KERNEL32(00000000), ref: 02D0B794
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B7BE
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0B7C6
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B7EE
                        • lstrlen.KERNEL32(00434AD4), ref: 02D0B865
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B889
                        • lstrcat.KERNEL32(00000000,00434AD4), ref: 02D0B895
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0B8C5
                        • lstrlen.KERNEL32(?), ref: 02D0B9CE
                        • lstrlen.KERNEL32(?), ref: 02D0B9DD
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0BA05
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcat
                        • String ID:
                        • API String ID: 2500673778-0
                        • Opcode ID: fdf8d0f52e33b711e37481372eefa1157b80fc976de2044a8c928680ebf86210
                        • Instruction ID: dd652433174cf26c3a3f8d0f5a43c99de4c0a46e5c15520d91d2c6f1053ac4f1
                        • Opcode Fuzzy Hash: fdf8d0f52e33b711e37481372eefa1157b80fc976de2044a8c928680ebf86210
                        • Instruction Fuzzy Hash: CB02F770A052068FCB25DF69D9C8B69BBA6EF4430DF18806AD8099B3B1D775DC42CF94
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1DC42
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1DC75
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1DC83
                        • lstrcat.KERNEL32(?,00638B0C), ref: 02D1DC9D
                        • lstrcat.KERNEL32(?,?), ref: 02D1DCB1
                        • lstrcat.KERNEL32(?,00638DD8), ref: 02D1DCC5
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1DCF5
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D1DCFC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1DD65
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$AttributesFileFolderPath
                        • String ID:
                        • API String ID: 4230089145-0
                        • Opcode ID: 30b76ee9403a79d3d69e95f151e3111db70670f2e28169058c7bccd52e540d17
                        • Instruction ID: 55524e7b3e0520d8bb1ed8b75de0272ff5327b34b80ad9f4f091411129a468cd
                        • Opcode Fuzzy Hash: 30b76ee9403a79d3d69e95f151e3111db70670f2e28169058c7bccd52e540d17
                        • Instruction Fuzzy Hash: FEB161B1900259AFDB10EF64DC88AEEB7BAFF48304F144969E945A7350DB749E44CFA0
                        APIs
                          • Part of subcall function 02D27447: lstrcpy.KERNEL32(00000000,ERROR), ref: 02D27465
                        • RegOpenKeyExA.ADVAPI32(?,00638D44,00000000,00020019,?), ref: 02D23A24
                        • RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 02D23A5E
                        • wsprintfA.USER32 ref: 02D23A89
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 02D23AA7
                        • RegCloseKey.ADVAPI32(?), ref: 02D23AB5
                        • RegCloseKey.ADVAPI32(?), ref: 02D23ABF
                        • RegQueryValueExA.ADVAPI32(?,00638DC0,00000000,000F003F,?,?), ref: 02D23B08
                        • lstrlen.KERNEL32(?), ref: 02D23B1D
                        • RegQueryValueExA.ADVAPI32(?,00638BD0,00000000,000F003F,?,00000400), ref: 02D23B8E
                        • RegCloseKey.ADVAPI32(?), ref: 02D23BD9
                        • RegCloseKey.ADVAPI32(?), ref: 02D23BF0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Close$OpenQueryValue$Enumlstrcpylstrlenwsprintf
                        • String ID: - $?
                        • API String ID: 13140697-712516993
                        • Opcode ID: 4016e62cd5e4081b712305953adacc26fe1bd5c79a6d3b08d2639c726e80a781
                        • Instruction ID: da377eb523093c50ff447850d37f6eedd860d5241480737d1d2e87679c2a62b9
                        • Opcode Fuzzy Hash: 4016e62cd5e4081b712305953adacc26fe1bd5c79a6d3b08d2639c726e80a781
                        • Instruction Fuzzy Hash: 85913B72D002599FCB10DF94D984EEEB7BAFB48318F1481A9E509AB350D7359D4ACFA0
                        APIs
                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407805
                        • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040784A
                        • strlen.MSVCRT ref: 0040787E
                        • StrStrA.SHLWAPI(?,Password), ref: 004078B8
                        • strlen.MSVCRT ref: 0040794D
                          • Part of subcall function 00407750: GetProcessHeap.KERNEL32(00000008,00000400), ref: 0040775E
                          • Part of subcall function 00407750: HeapAlloc.KERNEL32(00000000), ref: 00407765
                          • Part of subcall function 00407750: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040778D
                          • Part of subcall function 00407750: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004077AD
                          • Part of subcall function 00407750: LocalFree.KERNEL32(?), ref: 004077B7
                        • strcpy_s.MSVCRT ref: 004078E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004078EC
                        • HeapFree.KERNEL32(00000000), ref: 004078F3
                        • strlen.MSVCRT ref: 00407900
                        • strcpy_s.MSVCRT ref: 0040792A
                        • strlen.MSVCRT ref: 00407974
                        • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 00407A35
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocByteCharCryptDataLocalMultiOpenUnprotectWide
                        • String ID: Password
                        • API String ID: 3893107980-3434357891
                        • Opcode ID: 19d1acf34d1d55cb27fc19c5038643c5c3c088594c890ae25d8ed9645abd8a83
                        • Instruction ID: 521b7978b4fa7da916788c019a5619d9e52cd0612810612fc0d5a06b32f827bb
                        • Opcode Fuzzy Hash: 19d1acf34d1d55cb27fc19c5038643c5c3c088594c890ae25d8ed9645abd8a83
                        • Instruction Fuzzy Hash: 8A81FBB1D0021DAFDB10DF95DC84ADEBBB9EB48300F10416AE509B7250EB75AA85CBA5
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?), ref: 02D21908
                        • lstrcpy.KERNEL32(00000000,00638C44), ref: 02D21933
                        • lstrlen.KERNEL32(?), ref: 02D21940
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D2195D
                        • lstrcat.KERNEL32(00000000,?), ref: 02D2196B
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D21991
                        • lstrlen.KERNEL32(00638AA8), ref: 02D219A6
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D219C9
                        • lstrcat.KERNEL32(00000000,00638AA8), ref: 02D219D1
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D219F9
                        • ShellExecuteEx.SHELL32(?), ref: 02D21A34
                        • ExitProcess.KERNEL32 ref: 02D21A6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcatlstrlen$ExecuteExitFileModuleNameProcessShell
                        • String ID: <
                        • API String ID: 3579039295-4251816714
                        • Opcode ID: d8a4b448b3cbd2fec1d6e41789f4e9dc9c9ba109b5cf32146fe5b58423eccd26
                        • Instruction ID: c4cbb5b0b8de2d2b719e117e0a3fc07ad600d2b3f42849362429262e2f7a33a9
                        • Opcode Fuzzy Hash: d8a4b448b3cbd2fec1d6e41789f4e9dc9c9ba109b5cf32146fe5b58423eccd26
                        • Instruction Fuzzy Hash: B051407190125AAFDB11DFA4CC88A9EBBFAEF54308F105525E919A3351DB70DE05CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F24B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F279
                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 02D1F28D
                        • lstrlen.KERNEL32(00000000), ref: 02D1F29C
                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 02D1F2BA
                        • StrStrA.SHLWAPI(00000000,?), ref: 02D1F2E8
                        • lstrlen.KERNEL32(?), ref: 02D1F2FB
                        • strtok.MSVCRT(00000001,?), ref: 02D1F30D
                        • lstrlen.KERNEL32(00000000), ref: 02D1F319
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 02D1F366
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 02D1F3A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                        • String ID: ERROR
                        • API String ID: 2137491262-2861137601
                        • Opcode ID: 80c59eac5cf80d4bda51df79fd555529898d75ccb9dc590c0e6f2a1c13b73da1
                        • Instruction ID: 34d1e21e3cc6c1d2aeb4f9798faa4e02318eeaeaec95b8284d005563727aa60a
                        • Opcode Fuzzy Hash: 80c59eac5cf80d4bda51df79fd555529898d75ccb9dc590c0e6f2a1c13b73da1
                        • Instruction Fuzzy Hash: 83515D759012456FCB21AF78DC8CBAEB7A6EF44708F148558EC899BB60DB34DC05CBA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 0041EFE4
                        • lstrcpy.KERNEL32(00000000,?), ref: 0041F012
                        • StrCmpCA.SHLWAPI(00000000,ERROR,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F026
                        • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F035
                        • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F053
                        • StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F081
                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F094
                        • strtok.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F0A6
                        • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041F50B), ref: 0041F0B2
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F0FF
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 0041F13F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                        • String ID: ERROR
                        • API String ID: 2137491262-2861137601
                        • Opcode ID: aee0a447b126d5442498dd6ab1b5a1e15419bdb4c4a5a02f30999648276342be
                        • Instruction ID: b66d57a13ea8b35d4419c4896a523d09ee5fec8b855b61de0e243a190c349dae
                        • Opcode Fuzzy Hash: aee0a447b126d5442498dd6ab1b5a1e15419bdb4c4a5a02f30999648276342be
                        • Instruction Fuzzy Hash: 27519231B101019FCB21AF79DD49AAB77A5AF44304F04517EFC49AB392DB78DC468B98
                        APIs
                        • GetEnvironmentVariableA.KERNEL32(006388B4,00639BD8,0000FFFF), ref: 02D0A28D
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0A2BA
                        • lstrlen.KERNEL32(00639BD8), ref: 02D0A2C7
                        • lstrcpy.KERNEL32(00000000,00639BD8), ref: 02D0A2F1
                        • lstrlen.KERNEL32(00434C48), ref: 02D0A2FC
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0A319
                        • lstrcat.KERNEL32(00000000,00434C48), ref: 02D0A325
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0A34B
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0A356
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0A37B
                        • SetEnvironmentVariableA.KERNEL32(006388B4,00000000), ref: 02D0A396
                        • LoadLibraryA.KERNEL32(00638D78), ref: 02D0A3AA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                        • String ID:
                        • API String ID: 2929475105-0
                        • Opcode ID: d5838a98076a4314607f5b8b080eb43809f35224ac66107b4721e3277f40d57d
                        • Instruction ID: 7b1bb6b8d64b1fabafec272e3e0f38ab2f51b0c12d97ed41399d3461995dc125
                        • Opcode Fuzzy Hash: d5838a98076a4314607f5b8b080eb43809f35224ac66107b4721e3277f40d57d
                        • Instruction Fuzzy Hash: A991A171600B018FD7209BA8DCC8BA637A6EB48709F515029EA058B7F1EBB5DD80CFD5
                        APIs
                        • GetEnvironmentVariableA.KERNEL32(02E17688,00639BD8,0000FFFF), ref: 0040A026
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 0040A053
                        • lstrlenA.KERNEL32(00639BD8), ref: 0040A060
                        • lstrcpy.KERNEL32(00000000,00639BD8), ref: 0040A08A
                        • lstrlenA.KERNEL32(00434C48), ref: 0040A095
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A0B2
                        • lstrcatA.KERNEL32(00000000,00434C48), ref: 0040A0BE
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A0E4
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 0040A0EF
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040A114
                        • SetEnvironmentVariableA.KERNEL32(02E17688,00000000), ref: 0040A12F
                        • LoadLibraryA.KERNEL32(02E1EE40), ref: 0040A143
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                        • String ID:
                        • API String ID: 2929475105-0
                        • Opcode ID: a6335b5ca9e3af42653246851d915c54898d5c05ebadd1edfc0ea2bda3610dce
                        • Instruction ID: fd8e0b6dfd8c84f88a2374f5ea427055120ed7aee70c2e2ccb2c7cc6d95f7f07
                        • Opcode Fuzzy Hash: a6335b5ca9e3af42653246851d915c54898d5c05ebadd1edfc0ea2bda3610dce
                        • Instruction Fuzzy Hash: 759190306007009FD7319FA4DC88AA736A6AB94705F50507AF405AB3E1EFBDDD508BD6
                        APIs
                        • lstrcpy.KERNEL32(00000000,Function_0002CFEC), ref: 0040BC1F
                        • lstrlenA.KERNEL32(00000000), ref: 0040BC52
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BC7C
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 0040BC84
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040BCAC
                        • lstrlenA.KERNEL32(00434AD4), ref: 0040BD23
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcat
                        • String ID:
                        • API String ID: 2500673778-0
                        • Opcode ID: fac31dfb3169ff9f0701dee9c43aeca8a3b6f737986b5852a9285ffc591dca09
                        • Instruction ID: 37072dd1b280c51efd76c48aba3edd40c61a6322b10c9e257032049fce7c4c6e
                        • Opcode Fuzzy Hash: fac31dfb3169ff9f0701dee9c43aeca8a3b6f737986b5852a9285ffc591dca09
                        • Instruction Fuzzy Hash: 5AA13D30A012058FDB25DF69D949A9AB7B1EF44308F14907EE806A73E1DB79DC45CF98
                        APIs
                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 02D07A6C
                        • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 02D07AB1
                        • strlen.MSVCRT ref: 02D07AE5
                        • StrStrA.SHLWAPI(?,00434AC4), ref: 02D07B1F
                        • strlen.MSVCRT ref: 02D07BB4
                          • Part of subcall function 02D079B7: GetProcessHeap.KERNEL32(00000008,00000400), ref: 02D079C5
                          • Part of subcall function 02D079B7: RtlAllocateHeap.NTDLL(00000000), ref: 02D079CC
                          • Part of subcall function 02D079B7: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 02D079F4
                          • Part of subcall function 02D079B7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 02D07A14
                          • Part of subcall function 02D079B7: LocalFree.KERNEL32(?), ref: 02D07A1E
                        • strcpy_s.MSVCRT ref: 02D07B48
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02D07B53
                        • HeapFree.KERNEL32(00000000), ref: 02D07B5A
                        • strlen.MSVCRT ref: 02D07B67
                        • strcpy_s.MSVCRT ref: 02D07B91
                        • strlen.MSVCRT ref: 02D07BDB
                        • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 02D07C9C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocateByteCharCryptDataLocalMultiOpenUnprotectWide
                        • String ID:
                        • API String ID: 225686516-0
                        • Opcode ID: 19d1acf34d1d55cb27fc19c5038643c5c3c088594c890ae25d8ed9645abd8a83
                        • Instruction ID: b26978f7af3fcacc864183f88fa16c99f55fa828d94a4a1b8ec068db2befca00
                        • Opcode Fuzzy Hash: 19d1acf34d1d55cb27fc19c5038643c5c3c088594c890ae25d8ed9645abd8a83
                        • Instruction Fuzzy Hash: 0C81FEB1D00219AFDB10DF95DC84ADEFBB9EF48300F10416AE509E7250EB75AA85CFA5
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 02D1E9D0
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1EA06
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1EA14
                        • lstrcat.KERNEL32(?,00434F1C), ref: 02D1EA2D
                        • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 02D1EA94
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1EAC6
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1EAD4
                        • lstrcat.KERNEL32(?,00434F3C), ref: 02D1EAED
                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02D1EB58
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1EB87
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1EB95
                        • lstrcat.KERNEL32(?,00434F50), ref: 02D1EBAE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FolderPathlstrcpy
                        • String ID:
                        • API String ID: 818526691-0
                        • Opcode ID: 33d5853ba2b6a6b5c09b916741b0fb70bb188368c97d93c4101cbcdbd7af0f89
                        • Instruction ID: d74745b3f61ef6cf6fc7bfe546dd97bb2069ba90566a1bf4878a7c21a1faf3ca
                        • Opcode Fuzzy Hash: 33d5853ba2b6a6b5c09b916741b0fb70bb188368c97d93c4101cbcdbd7af0f89
                        • Instruction Fuzzy Hash: DA710870E40219ABD724EB60DC89FEC7775EF48700F144498BA199B2D0DBB49E44CFA8
                        APIs
                        • strtok_s.MSVCRT ref: 004181D3
                        • lstrlenA.KERNEL32(00000000,?), ref: 0041820C
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00418243
                        • lstrlenA.KERNEL32(00000000), ref: 00418260
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00418297
                        • lstrlenA.KERNEL32(00000000), ref: 004182B4
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004182EB
                        • lstrlenA.KERNEL32(00000000), ref: 00418308
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00418337
                        • lstrlenA.KERNEL32(00000000), ref: 00418351
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00418380
                        • strtok_s.MSVCRT ref: 0041839A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpylstrlen$strtok_s
                        • String ID:
                        • API String ID: 2211830134-0
                        • Opcode ID: 28a6eb865cf9a12f804becf526d45632e747f4c2bdadd9976b0f78d6b0d65d59
                        • Instruction ID: 39a53bccff0fa6c14695067a9bdcdbd60e04f939df08b113d3ee61ac42a1e5cc
                        • Opcode Fuzzy Hash: 28a6eb865cf9a12f804becf526d45632e747f4c2bdadd9976b0f78d6b0d65d59
                        • Instruction Fuzzy Hash: CA518C71A006069BDB14DF29D958AABB7A4EF00700F04412AED16EB384DF78E990CBE4
                        APIs
                        • ??_U@YAPAXI@Z.MSVCRT(00064000,?,00000000), ref: 02D22678
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D226B3
                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 02D226C4
                        • memset.MSVCRT ref: 02D226EC
                        • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00000208,00000000), ref: 02D22743
                        • lstrlen.KERNEL32(00000000), ref: 02D22750
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D227D7
                        • lstrlen.KERNEL32(00000000), ref: 02D227DE
                        • strlen.MSVCRT ref: 02D22802
                        • memset.MSVCRT ref: 02D2288C
                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 02D228D9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Processlstrcpylstrlenmemset$MemoryOpenReadstrlen
                        • String ID:
                        • API String ID: 311138045-0
                        • Opcode ID: 7306e6e81be679546469bf31094129e18bcf2938b5562a65fbea43237994e1b0
                        • Instruction ID: 787beb5217178615a8d5d391cd1ddad2d436ab7d0b32b538d80196253dec3835
                        • Opcode Fuzzy Hash: 7306e6e81be679546469bf31094129e18bcf2938b5562a65fbea43237994e1b0
                        • Instruction Fuzzy Hash: AE81A171E042159BDB24CF94DC48BAEF7B6EF94308F148069E904A7380DB759D4ACFA5
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,02D20F57), ref: 02D244DD
                        • GetDesktopWindow.USER32 ref: 02D244E7
                        • GetWindowRect.USER32(00000000,?), ref: 02D244F4
                        • SelectObject.GDI32(00000000,00000000), ref: 02D24526
                        • GetHGlobalFromStream.COMBASE(02D20F57,?), ref: 02D2459D
                        • GlobalLock.KERNEL32(?), ref: 02D245A7
                        • GlobalSize.KERNEL32(?), ref: 02D245B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Global$StreamWindow$CreateDesktopFromLockObjectRectSelectSize
                        • String ID:
                        • API String ID: 1264946473-0
                        • Opcode ID: 4df049b90167f18abc31d218c70bb12806ecc89bd0e67f63d31103b3401f95cd
                        • Instruction ID: a3b14111646ffd1fb3c4ca946588c366e15bb52d5ecd1c2de6781d8d24f84f1f
                        • Opcode Fuzzy Hash: 4df049b90167f18abc31d218c70bb12806ecc89bd0e67f63d31103b3401f95cd
                        • Instruction Fuzzy Hash: B1510CB5A00219AFDB10DFA4DD88EEEBBBAEF48714F104519F905A3250DB74AD05CFA1
                        APIs
                        • lstrcat.KERNEL32(?,00638B0C), ref: 02D1E274
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1E29E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E2D6
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1E2E4
                        • lstrcat.KERNEL32(?,?), ref: 02D1E2FF
                        • lstrcat.KERNEL32(?,?), ref: 02D1E313
                        • lstrcat.KERNEL32(?,00638A84), ref: 02D1E327
                        • lstrcat.KERNEL32(?,?), ref: 02D1E33B
                        • lstrcat.KERNEL32(?,00638AC8), ref: 02D1E34E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E386
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D1E38D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$AttributesFileFolderPath
                        • String ID:
                        • API String ID: 4230089145-0
                        • Opcode ID: ad19b1581edb05993551cdc68ca35f4d831bd1402a2252a48962e02a2718f3cf
                        • Instruction ID: a34b80c3daa3fd6182d11afc77f7e4aba6944a3cf37ad1be799f7d725f91419c
                        • Opcode Fuzzy Hash: ad19b1581edb05993551cdc68ca35f4d831bd1402a2252a48962e02a2718f3cf
                        • Instruction Fuzzy Hash: 3A61537590111CABCB54DB64DC88BDDB7B5FF48300F1489A9AA49A3390EB709F85CFA0
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D06D66
                        • InternetOpenA.WININET(0042CFEC,00000001,00000000,00000000,00000000), ref: 02D06D93
                        • StrCmpCA.SHLWAPI(?,00638C80), ref: 02D06DB1
                        • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 02D06DD1
                        • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 02D06DEF
                        • InternetReadFile.WININET(00000000,?,00000400,?), ref: 02D06E08
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 02D06E2D
                        • InternetReadFile.WININET(00000000,?,00000400,?), ref: 02D06E57
                        • CloseHandle.KERNEL32(00000000), ref: 02D06E77
                        • InternetCloseHandle.WININET(00000000), ref: 02D06E7E
                        • InternetCloseHandle.WININET(?), ref: 02D06E88
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                        • String ID:
                        • API String ID: 2500263513-0
                        • Opcode ID: 9f9d22ed5160631bbb7f1e9ca936ac56629dc2d30d68bc754a948f84c579ac4c
                        • Instruction ID: 2e4a4a3bdba3b6ef05a59d59b670850ddff551520309ff5191977c782a7eb534
                        • Opcode Fuzzy Hash: 9f9d22ed5160631bbb7f1e9ca936ac56629dc2d30d68bc754a948f84c579ac4c
                        • Instruction Fuzzy Hash: 71414BB1A00315ABDB20DB64DC89FAE77A9EB44744F108558FA05E72D0EF70EE44CBA4
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 00406AFF
                        • InternetOpenA.WININET(Function_0002CFEC,00000001,00000000,00000000,00000000), ref: 00406B2C
                        • StrCmpCA.SHLWAPI(?,02E1FEC0), ref: 00406B4A
                        • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 00406B6A
                        • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406B88
                        • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406BA1
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00406BC6
                        • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00406BF0
                        • CloseHandle.KERNEL32(00000000), ref: 00406C10
                        • InternetCloseHandle.WININET(00000000), ref: 00406C17
                        • InternetCloseHandle.WININET(?), ref: 00406C21
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                        • String ID:
                        • API String ID: 2500263513-0
                        • Opcode ID: b945eee94cec13ce41296d715729208f43379ab5552c35fbddc9baa2424bf0da
                        • Instruction ID: c5ad55131c4ce7db38fffddb58cb683fbd38acd074282c5770988a30aae92a0f
                        • Opcode Fuzzy Hash: b945eee94cec13ce41296d715729208f43379ab5552c35fbddc9baa2424bf0da
                        • Instruction Fuzzy Hash: 734171B1600215ABDB24DF64DC89FAE77B9EB44704F004469FA06E72C0DF74AE448BA8
                        APIs
                        • LoadLibraryA.KERNEL32(00435174,?,02D1750B), ref: 02D24A4D
                        • GetProcAddress.KERNEL32(00000000,00435180), ref: 02D24A63
                        • GetProcAddress.KERNEL32(00000000,00435188), ref: 02D24A74
                        • GetProcAddress.KERNEL32(00000000,00435194), ref: 02D24A85
                        • GetProcAddress.KERNEL32(00000000,004351A0), ref: 02D24A96
                        • GetProcAddress.KERNEL32(00000000,004351A8), ref: 02D24AA7
                        • GetProcAddress.KERNEL32(00000000,004351B4), ref: 02D24AB8
                        • GetProcAddress.KERNEL32(00000000,004351BC), ref: 02D24AC9
                        • GetProcAddress.KERNEL32(00000000,004351C4), ref: 02D24ADA
                        • GetProcAddress.KERNEL32(00000000,004351D4), ref: 02D24AEB
                        • GetProcAddress.KERNEL32(00000000,004351E0), ref: 02D24AFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$LibraryLoad
                        • String ID:
                        • API String ID: 2238633743-0
                        • Opcode ID: f5155ff952da553fc3a3bff4ab4fb1888bde0f0d590b6b3d85c4f9227467158f
                        • Instruction ID: 652adc7be33a4b97ce8d11ffbe83cc07f174413d7f107738e2cce12cdd1e1363
                        • Opcode Fuzzy Hash: f5155ff952da553fc3a3bff4ab4fb1888bde0f0d590b6b3d85c4f9227467158f
                        • Instruction Fuzzy Hash: 6311D376D52720AF8B149BA5AD0DB963ABABA0A70A718381BF051D3160DBF84000DFE4
                        APIs
                          • Part of subcall function 004077D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00407805
                          • Part of subcall function 004077D0: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0040784A
                          • Part of subcall function 004077D0: strlen.MSVCRT ref: 0040787E
                          • Part of subcall function 004077D0: StrStrA.SHLWAPI(?,Password), ref: 004078B8
                          • Part of subcall function 004077D0: strcpy_s.MSVCRT ref: 004078E1
                          • Part of subcall function 004077D0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004078EC
                          • Part of subcall function 004077D0: HeapFree.KERNEL32(00000000), ref: 004078F3
                          • Part of subcall function 004077D0: strlen.MSVCRT ref: 00407900
                        • lstrcatA.KERNEL32(00000000,00434AD4), ref: 00407A90
                        • lstrcatA.KERNEL32(00000000,?), ref: 00407ABD
                        • lstrcatA.KERNEL32(00000000, : ), ref: 00407ACF
                        • lstrcatA.KERNEL32(00000000,?), ref: 00407AF0
                        • wsprintfA.USER32 ref: 00407B10
                        • lstrcpy.KERNEL32(00000000,?), ref: 00407B39
                        • lstrcatA.KERNEL32(00000000,00000000), ref: 00407B47
                        • lstrcatA.KERNEL32(00000000,00434AD4), ref: 00407B60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                        • String ID: :
                        • API String ID: 2460923012-3653984579
                        • Opcode ID: e565b7c4b7521a58f45a601299f64ae2030a9f6bfe604a6b94189d29f23ce9d1
                        • Instruction ID: 4a0270a12d15eba44ba155fce02676c7c42fa7ad0357aa4cf213092b6f362f58
                        • Opcode Fuzzy Hash: e565b7c4b7521a58f45a601299f64ae2030a9f6bfe604a6b94189d29f23ce9d1
                        • Instruction Fuzzy Hash: CA319572E04214AFCB14DB64DC449ABB77AEB88704F14552EF605A3390DB78F941CBA5
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D0BE86
                        • lstrlen.KERNEL32(00000000), ref: 02D0BEB9
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0BEE3
                        • lstrcat.KERNEL32(00000000,00000000), ref: 02D0BEEB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D0BF13
                        • lstrlen.KERNEL32(00434AD4), ref: 02D0BF8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen$lstrcat
                        • String ID:
                        • API String ID: 2500673778-0
                        • Opcode ID: 8c7ae8d9145d9521553447a705b0b53fd086f1c9fe675d944289f12c0e91ea3f
                        • Instruction ID: 06715d3600e30aab4288546b5ad938d5c4870aab145c7b1d6d0e9a57f40dc74d
                        • Opcode Fuzzy Hash: 8c7ae8d9145d9521553447a705b0b53fd086f1c9fe675d944289f12c0e91ea3f
                        • Instruction Fuzzy Hash: 67A12C74A012058FCB14DF68D988BADB7B6EF44309F24816AE809973B0DB76DC45CFA0
                        APIs
                          • Part of subcall function 02D27577: lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                          • Part of subcall function 02D27577: lstrcpy.KERNEL32(00000000), ref: 02D275A6
                          • Part of subcall function 02D27577: lstrcat.KERNEL32(?,------), ref: 02D275B0
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C919
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C942
                        • ShellExecuteEx.SHELL32(0000003C), ref: 02D1CA36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$ExecuteShelllstrcatlstrlen
                        • String ID: /i "$ /passive$.msi$<$`KC
                        • API String ID: 619169029-1717736166
                        • Opcode ID: 8d3998ff0bfdfd48114819656236ab29d70c29e1842c8ff8d6cb25bed2f5cfd7
                        • Instruction ID: 11c66a5e8ccbb29b49f4a196dc4174ab77144aad01758546a9c54843c9ab5607
                        • Opcode Fuzzy Hash: 8d3998ff0bfdfd48114819656236ab29d70c29e1842c8ff8d6cb25bed2f5cfd7
                        • Instruction Fuzzy Hash: 99416B71D0125A8BCB20EF68D888A9CB7A2EF54318F248469D805E7760DB30ED4ACF90
                        APIs
                        • __getptd.LIBCMT ref: 02D294E0
                          • Part of subcall function 02D28A66: __getptd_noexit.LIBCMT ref: 02D28A69
                          • Part of subcall function 02D28A66: __amsg_exit.LIBCMT ref: 02D28A76
                        • __amsg_exit.LIBCMT ref: 02D29500
                        • __lock.LIBCMT ref: 02D29510
                        • InterlockedDecrement.KERNEL32(?), ref: 02D2952D
                        • free.MSVCRT ref: 02D29540
                        • InterlockedIncrement.KERNEL32(XuC), ref: 02D29558
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                        • String ID: XuC$XuC
                        • API String ID: 634100517-965221565
                        • Opcode ID: 186becff79528f6b03c02cc740923384a5e3405ce73508090363fc677966f78f
                        • Instruction ID: 9b808b06e3d6ac6319017bb4db1090889c03aa07444b33785dcd078dbcce4b45
                        • Opcode Fuzzy Hash: 186becff79528f6b03c02cc740923384a5e3405ce73508090363fc677966f78f
                        • Instruction Fuzzy Hash: EE01C471E0AB31ABD731AF29984479DB3A5FF24728F251115D804A3390D734AE49CFE9
                        APIs
                        • memcmp.MSVCRT(?,v20,00000003), ref: 00409E04
                        • memcmp.MSVCRT(?,v10,00000003), ref: 00409E42
                        • memset.MSVCRT ref: 00409E6F
                        • LocalAlloc.KERNEL32(00000040), ref: 00409EA7
                          • Part of subcall function 004271E0: lstrcpy.KERNEL32(00000000,ERROR), ref: 004271FE
                        • lstrcpy.KERNEL32(00000000,00434C44), ref: 00409FB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpymemcmp$AllocLocalmemset
                        • String ID: @$v10$v20
                        • API String ID: 3420379846-278772428
                        • Opcode ID: 62fc78b8687b5e8bdbb6318462315b1f03bf1334cbc6fabd5c242cce61d92248
                        • Instruction ID: d6fed50945dbe67a18552329cc40c0b8136d71c8f17330be27d8feaef36422da
                        • Opcode Fuzzy Hash: 62fc78b8687b5e8bdbb6318462315b1f03bf1334cbc6fabd5c242cce61d92248
                        • Instruction Fuzzy Hash: C651AC31B002099BDB10EF69DC45B9E77A4AF40318F15503AF909AB2D2DBB8ED058BD8
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E2D6
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1E2E4
                        • lstrcat.KERNEL32(?,?), ref: 02D1E2FF
                        • lstrcat.KERNEL32(?,?), ref: 02D1E313
                        • lstrcat.KERNEL32(?,00638A84), ref: 02D1E327
                        • lstrcat.KERNEL32(?,?), ref: 02D1E33B
                        • lstrcat.KERNEL32(?,00638AC8), ref: 02D1E34E
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E386
                        • GetFileAttributesA.KERNEL32(00000000), ref: 02D1E38D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$lstrcpy$AttributesFile
                        • String ID:
                        • API String ID: 3428472996-0
                        • Opcode ID: 48df637f5adf256f89f33124bfa96c9134e1575a9771df776a95f89c303645bd
                        • Instruction ID: 50d9f91b64ad5160e12531737592bcfca702cb698250c33bf17f3f60927daa6b
                        • Opcode Fuzzy Hash: 48df637f5adf256f89f33124bfa96c9134e1575a9771df776a95f89c303645bd
                        • Instruction Fuzzy Hash: F9417275901118ABCB15EB64DC88BDDB7B5FF48300F1485A9E949937A0EB709F85CFA0
                        APIs
                          • Part of subcall function 02D27577: lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                          • Part of subcall function 02D27577: lstrcpy.KERNEL32(00000000), ref: 02D275A6
                          • Part of subcall function 02D27577: lstrcat.KERNEL32(?,------), ref: 02D275B0
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C7EB
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C814
                        • ShellExecuteEx.SHELL32(0000003C), ref: 02D1C876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                        • String ID: .dll$<$LLC$`KC
                        • API String ID: 3031569214-3802841039
                        • Opcode ID: 606c41999c6aac6bee80e96302b770951e0b65f61f9a381296699d4c489133f8
                        • Instruction ID: 525bd910d6e2ee7b93c9c6132b38766dff8b8ff7122ef7d826b638803df9276c
                        • Opcode Fuzzy Hash: 606c41999c6aac6bee80e96302b770951e0b65f61f9a381296699d4c489133f8
                        • Instruction Fuzzy Hash: 26515171D102568BCB20EFA4DCC8A9CF7B6EF44318F259469D505A7760DB349D4ACFA0
                        APIs
                          • Part of subcall function 02D27577: lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                          • Part of subcall function 02D27577: lstrcpy.KERNEL32(00000000), ref: 02D275A6
                          • Part of subcall function 02D27577: lstrcat.KERNEL32(?,------), ref: 02D275B0
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C640
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1C669
                        • ShellExecuteEx.SHELL32(0000003C), ref: 02D1C6CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                        • String ID: "" $<$`KC$`KC
                        • API String ID: 3031569214-938110770
                        • Opcode ID: 8b08d70dfb265bcf26dcc510f6809d8a0279fc7ebcafee22a942fb21449ba233
                        • Instruction ID: fdde0de05d7fec643feef345968ed1b5998866ab93448b1027a8e0bc3ce2b9d7
                        • Opcode Fuzzy Hash: 8b08d70dfb265bcf26dcc510f6809d8a0279fc7ebcafee22a942fb21449ba233
                        • Instruction Fuzzy Hash: 35515C71D1129A8BCB20EFB8DCC8A9CF7B2EF54318F245469D505A7760DA30AD4ACF90
                        APIs
                        • GetWindowsDirectoryA.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 02D229E2
                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,02D1961D,00000000,00000000,00000000,00000000), ref: 02D22A13
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D22A76
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D22A7D
                        • wsprintfA.USER32 ref: 02D22AA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowswsprintf
                        • String ID: :\$C
                        • API String ID: 2572753744-3309953409
                        • Opcode ID: ce0125ce13eb0816da93c0b4716b1f90aac9f737335d5e264dd372cef419b960
                        • Instruction ID: 3c815d1c9ce45e8409f7264a62d37f2f457df1405bdb7fefc3170a9b663d7d5b
                        • Opcode Fuzzy Hash: ce0125ce13eb0816da93c0b4716b1f90aac9f737335d5e264dd372cef419b960
                        • Instruction Fuzzy Hash: 54317CB1D082599FDB14CFA88989AEEFFB9EB58704F00416AF505E7650E2748A40CBB1
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00401135
                        • HeapAlloc.KERNEL32(00000000), ref: 0040113C
                        • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00401159
                        • RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401173
                        • RegCloseKey.ADVAPI32(?), ref: 0040117D
                        Strings
                        • SOFTWARE\monero-project\monero-core, xrefs: 0040114F
                        • wallet_path, xrefs: 0040116D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                        • String ID: SOFTWARE\monero-project\monero-core$wallet_path
                        • API String ID: 3466090806-4244082812
                        • Opcode ID: 6d01a78dd2703cc8c80cfc44e62c956613e7042535cbaa24fe8283e197e708bc
                        • Instruction ID: 383e7467a56373d6d0d7d4512f8a3326ad796bb69a11dfcae5090baa37e7c7c5
                        • Opcode Fuzzy Hash: 6d01a78dd2703cc8c80cfc44e62c956613e7042535cbaa24fe8283e197e708bc
                        • Instruction Fuzzy Hash: 23F06D75A40308BFD7049BA09C8DFEA7B7DEB04755F100059BE05E2290EAB05A448BE0
                        APIs
                        • InternetOpenA.WININET(0042CFEC,00000001,00000000,00000000,00000000), ref: 02D09346
                        • InternetOpenUrlA.WININET(00000000,00434B24,00000000,00000000,80000000,00000000), ref: 02D09363
                        • InternetCloseHandle.WININET(00000000), ref: 02D09370
                          • Part of subcall function 02D18097: memchr.MSVCRT ref: 02D180D6
                          • Part of subcall function 02D18097: memcmp.MSVCRT(00000000,?,?,?,00434B40,00000000), ref: 02D180F0
                          • Part of subcall function 02D18097: memchr.MSVCRT ref: 02D1810F
                          • Part of subcall function 02D08BE7: std::_Xinvalid_argument.LIBCPMT ref: 02D08BFD
                        • strlen.MSVCRT ref: 02D0938C
                        • InternetReadFile.WININET(?,?,?,00000000), ref: 02D093CD
                        • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02D093FE
                        • InternetCloseHandle.WININET(00000000), ref: 02D09409
                        • InternetCloseHandle.WININET(00000000), ref: 02D09410
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_strlen
                        • String ID:
                        • API String ID: 1093921401-0
                        • Opcode ID: aa43ee7c0b556feb97ab861848f3baad4bb609c9c6839326e9c857c0b64dd1d7
                        • Instruction ID: adc4a79cae7d5dc271ac47011a031d497c78adb41b4369306e26924ef34186bc
                        • Opcode Fuzzy Hash: aa43ee7c0b556feb97ab861848f3baad4bb609c9c6839326e9c857c0b64dd1d7
                        • Instruction Fuzzy Hash: 60518271A00209ABD720DBA4DC85BDEF7EADB48714F14416AF505E32D0DBB4EA44CBA5
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 02D249C0
                        • Process32First.KERNEL32(00000000,00000128), ref: 02D249D0
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D249E2
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 02D24A03
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 02D24A12
                        • CloseHandle.KERNEL32(00000000), ref: 02D24A19
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D24A27
                        • CloseHandle.KERNEL32(00000000), ref: 02D24A32
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                        • String ID:
                        • API String ID: 3836391474-0
                        • Opcode ID: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                        • Instruction ID: 150f9452b616bb426675a9d768240fd0637b0d0d9877689a69c8adbc3622d0c9
                        • Opcode Fuzzy Hash: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                        • Instruction Fuzzy Hash: 440192716412246FE7215B609C89FEA777DEB48759F001198FD09A2291EFB08D84CAE4
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 00424759
                        • Process32First.KERNEL32(00000000,00000128), ref: 00424769
                        • Process32Next.KERNEL32(00000000,00000128), ref: 0042477B
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0042479C
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 004247AB
                        • CloseHandle.KERNEL32(00000000), ref: 004247B2
                        • Process32Next.KERNEL32(00000000,00000128), ref: 004247C0
                        • CloseHandle.KERNEL32(00000000), ref: 004247CB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                        • String ID:
                        • API String ID: 3836391474-0
                        • Opcode ID: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                        • Instruction ID: 2796138e49d57b0afb57703697c4648b669f32e79a409fcda75587c3eb52ce3c
                        • Opcode Fuzzy Hash: 52672e04caeec890ace4a1d791050bff1080cdcf40c9c1db2d30368871fa3206
                        • Instruction Fuzzy Hash: 3E019271601224AFE7215B70ACC9FEB77BDEB88791F401189F90592290EFB48D808AA4
                        APIs
                        • strlen.MSVCRT ref: 02D2240A
                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,02D22706,00000000,00000000,00000000), ref: 02D22438
                        • VirtualQueryEx.KERNEL32(00000000,00000000,?,0000001C), ref: 02D22488
                        • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00064000,00000000), ref: 02D224E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: MemoryProcessQueryReadVirtualstrlen
                        • String ID:
                        • API String ID: 3366127311-0
                        • Opcode ID: 0f886d65332f8fbf52c22fc51f68d7eba78b0d5b2c0050cfdc4bf87beff49f9b
                        • Instruction ID: bba89f5f2b25133df47f19be557bbd1941598e14999e5312536c6bcf555a1571
                        • Opcode Fuzzy Hash: 0f886d65332f8fbf52c22fc51f68d7eba78b0d5b2c0050cfdc4bf87beff49f9b
                        • Instruction Fuzzy Hash: 5471C371A001299BDB14CFA8D898AAF77BAEF98718F148129FD45E7380D734DD45CBA0
                        APIs
                        • lstrlenA.KERNEL32(00434AD4), ref: 0040D90A
                        • lstrcpy.KERNEL32(00000000), ref: 0040D92A
                        • lstrcatA.KERNEL32(00000000,00434AD4), ref: 0040D936
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0040D95F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcatlstrlen
                        • String ID:
                        • API String ID: 1049500425-0
                        • Opcode ID: 5b00cf6fe486de35be42e57c9bc7a6d7644a4f9237187232f888188bb7919442
                        • Instruction ID: fd79f64981e394aa1f2c29a473bce4c2f29cda6348de706d311ec5c033d013d3
                        • Opcode Fuzzy Hash: 5b00cf6fe486de35be42e57c9bc7a6d7644a4f9237187232f888188bb7919442
                        • Instruction Fuzzy Hash: DE713D70B102058FCB25EF69D94965A77A1AF44318B18907EF806AB3E2DB79DC45CF88
                        APIs
                        • LoadLibraryA.KERNEL32(?), ref: 02D074A5
                        • GetProcessHeap.KERNEL32(00000008,00000010), ref: 02D074E0
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D074E7
                        • memcpy.MSVCRT(00000000,?), ref: 02D07514
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02D0752A
                        • HeapFree.KERNEL32(00000000), ref: 02D07531
                        • GetProcAddress.KERNEL32(00000000,?), ref: 02D07590
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$Process$AddressAllocateFreeLibraryLoadProcmemcpy
                        • String ID:
                        • API String ID: 413393563-0
                        • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                        • Instruction ID: ea2c9e8e8750691eca5fd149e9b76b3522f32bdac43262a25892f6cea234e11c
                        • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                        • Instruction Fuzzy Hash: 2D412F71B017059BE724CF69D8887AAF7E9EB84319F1445A9E949CB3A0E771ED00CB50
                        APIs
                        • LoadLibraryA.KERNEL32(?), ref: 0040723E
                        • GetProcessHeap.KERNEL32(00000008,00000010), ref: 00407279
                        • HeapAlloc.KERNEL32(00000000), ref: 00407280
                        • memcpy.MSVCRT(00000000,?), ref: 004072AD
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 004072C3
                        • HeapFree.KERNEL32(00000000), ref: 004072CA
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00407329
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$Process$AddressAllocFreeLibraryLoadProcmemcpy
                        • String ID:
                        • API String ID: 1745114167-0
                        • Opcode ID: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                        • Instruction ID: 5c04f978e963cdea92a01edc1f3ad230323f660b4d2968f88ba47752cd35672e
                        • Opcode Fuzzy Hash: b8b6d1e05054ea07a43d014ff49ccb22529942b78b606a01fe6625217ee999e1
                        • Instruction Fuzzy Hash: 35416B71B046069BEB20CF69DC84BAAB3E9FB84305F1445BAEC49D7380E635F900DB65
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 00409CA8
                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409CDA
                        • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D03
                        • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D3C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocLocallstrcpymemcmp
                        • String ID: $"encrypted_key":"$DPAPI
                        • API String ID: 4154055062-738592651
                        • Opcode ID: b9d0b58e172b2588348979975f5dd8183a5d6399ff73fee5fa6a6ea10174c86d
                        • Instruction ID: c8b8885e5d777158b5f49cc3b9a5757fa26b25cb8b928796afc525f1858c9096
                        • Opcode Fuzzy Hash: b9d0b58e172b2588348979975f5dd8183a5d6399ff73fee5fa6a6ea10174c86d
                        • Instruction Fuzzy Hash: 6F417B31B0020A9BDB21EF69D9456AF77B4AF54308F04407AED15B72E3DA78AD04CB98
                        APIs
                        • strtok_s.MSVCRT ref: 00417F04
                        • lstrlenA.KERNEL32(00000000), ref: 00417F31
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 00417F60
                        • strtok_s.MSVCRT ref: 00417F71
                        • StrCmpCA.SHLWAPI(00000000,00431C70), ref: 00417FA5
                        • StrCmpCA.SHLWAPI(00000000,00431C70), ref: 00417FD3
                        • StrCmpCA.SHLWAPI(00000000,00431C70), ref: 00418007
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$lstrcpylstrlen
                        • String ID:
                        • API String ID: 348468850-0
                        • Opcode ID: cfdd6ca7b6e63bea9f0c686285741a3f25d0c319cebbca4477aaf79dd9a5e9c5
                        • Instruction ID: 2436ff4e6ee227030948b1fe2db7e6733daf726be61a52efa26c24c8a2a8d093
                        • Opcode Fuzzy Hash: cfdd6ca7b6e63bea9f0c686285741a3f25d0c319cebbca4477aaf79dd9a5e9c5
                        • Instruction Fuzzy Hash: A5416070604116DFCB21DF68D884AEB77B4FF59300F11419AE8059B350DB74AAA6CF95
                        APIs
                        • strtok_s.MSVCRT ref: 02D182DC
                        • lstrlen.KERNEL32(00000000), ref: 02D18322
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D18351
                        • StrCmpCA.SHLWAPI(00000000,00431C70), ref: 02D18369
                        • lstrlen.KERNEL32(00000000), ref: 02D183A7
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D183D6
                        • strtok_s.MSVCRT ref: 02D183E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpylstrlenstrtok_s
                        • String ID:
                        • API String ID: 3280532728-0
                        • Opcode ID: 626126f7ae416f0d4c528e63a6bc51478b3236b041020af488acc39559d9fdc1
                        • Instruction ID: b0cc9fea6ab684ac84a7fd6b8e8cc0e24718e313ad0697a11964a60afc8c454f
                        • Opcode Fuzzy Hash: 626126f7ae416f0d4c528e63a6bc51478b3236b041020af488acc39559d9fdc1
                        • Instruction Fuzzy Hash: 6641AE75600206AFDB21DF68E988BAABBF4EF44304F148119EC89D7754EB74ED41CBA0
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 02D058C1
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D058C8
                        • InternetOpenA.WININET(0042CFEC,00000000,00000000,00000000,00000000), ref: 02D058DE
                        • InternetOpenUrlA.WININET(00000000,00000001,00000000,00000000,04000100,00000000), ref: 02D058F9
                        • InternetReadFile.WININET(?,?,00000400,00000001), ref: 02D05923
                        • InternetCloseHandle.WININET(?), ref: 02D05961
                        • InternetCloseHandle.WININET(00000000), ref: 02D05968
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessRead
                        • String ID:
                        • API String ID: 3066467675-0
                        • Opcode ID: 56991fbfa8ff731cefd4789a31361217da942f2a87cf7d2a2611e9ffcee565a7
                        • Instruction ID: 364a075619c33e3295d97084086c161f0b93d9b23178b6b72ce8ba708dba4747
                        • Opcode Fuzzy Hash: 56991fbfa8ff731cefd4789a31361217da942f2a87cf7d2a2611e9ffcee565a7
                        • Instruction Fuzzy Hash: A2415B70E00305AFDB24CF54EC88BAAB7B5FF48714F5480A9E9199B3A0E7719941CFA4
                        APIs
                        • strtok_s.MSVCRT ref: 00418075
                        • lstrlenA.KERNEL32(00000000), ref: 004180BB
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 004180EA
                        • StrCmpCA.SHLWAPI(00000000,00431C70), ref: 00418102
                        • lstrlenA.KERNEL32(00000000), ref: 00418140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 0041816F
                        • strtok_s.MSVCRT ref: 0041817F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpylstrlenstrtok_s
                        • String ID:
                        • API String ID: 3280532728-0
                        • Opcode ID: 678b0dbd26197ed6da7c709e455fb13d295555b99b1a01a9d333184e571a7f21
                        • Instruction ID: cc2310a9154b9e7664668e181f723abbf99bb39c712426c9a1edb56d6e69f7d2
                        • Opcode Fuzzy Hash: 678b0dbd26197ed6da7c709e455fb13d295555b99b1a01a9d333184e571a7f21
                        • Instruction Fuzzy Hash: 5E414F75600206ABCB21DF68D948BEBBBB4EF44700F11815EA849D7254EF78D986CB94
                        APIs
                        • memset.MSVCRT ref: 02D24781
                        • GetProcessHeap.KERNEL32(00000000,000000FA,00000000,?,?,?,02D151A0), ref: 02D247AC
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D247B3
                        • wsprintfW.USER32 ref: 02D247C2
                        • OpenProcess.KERNEL32(00001001,00000000,?,?), ref: 02D24831
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?), ref: 02D24840
                        • CloseHandle.KERNEL32(00000000,?,?), ref: 02D24847
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                        • String ID:
                        • API String ID: 3729781310-0
                        • Opcode ID: c6061c17c14f2bf59568cb40a23737b7e44df780ea9a98ad1f2c030f43cf0d92
                        • Instruction ID: e28724461e18b2d4cd907d581923510d96488dd2633d8265aa3e332f2464ec55
                        • Opcode Fuzzy Hash: c6061c17c14f2bf59568cb40a23737b7e44df780ea9a98ad1f2c030f43cf0d92
                        • Instruction Fuzzy Hash: C5317E71A00255ABDB20DBA0DC88FDEB77AEF44744F104059FA05A7280DBB4AA44CBA5
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00417D58
                          • Part of subcall function 0042A1C0: std::exception::exception.LIBCMT ref: 0042A1D5
                          • Part of subcall function 0042A1C0: __CxxThrowException@8.LIBCMT ref: 0042A1EA
                        • std::_Xinvalid_argument.LIBCPMT ref: 00417D76
                        • std::_Xinvalid_argument.LIBCPMT ref: 00417D91
                        • memcpy.MSVCRT(?,?,?,00000000,?,?,00417C7A,00000000,?,?,00000000,?,00409186,?), ref: 00417DF4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$Exception@8Throwmemcpystd::exception::exception
                        • String ID: invalid string position$string too long
                        • API String ID: 702443124-4289949731
                        • Opcode ID: 7e47054b543add41ed036c20b3e7533534c3db14565d3586dec7f27f450a48db
                        • Instruction ID: f15b76001c844ab4d3943bced7ba41bef4be345ab754cf2a4fc76cc1ef35ab8f
                        • Opcode Fuzzy Hash: 7e47054b543add41ed036c20b3e7533534c3db14565d3586dec7f27f450a48db
                        • Instruction Fuzzy Hash: 7C21D5313043044BD720DE2CE880ABAB7F5AF96764F204A6FE4528B381D774D89087A9
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D233CD
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D233D4
                        • RegOpenKeyExA.ADVAPI32(80000002,006389D4,00000000,00020119,?), ref: 02D233F3
                        • RegQueryValueExA.ADVAPI32(?,00638CEC,00000000,00000000,00000000,000000FF), ref: 02D2340E
                        • RegCloseKey.ADVAPI32(?), ref: 02D23418
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID: 8LC
                        • API String ID: 3225020163-1713405209
                        • Opcode ID: a379eebdbbcec35e8ed859733ff2708c3a1330b01a2a2298d96069c18e9e916f
                        • Instruction ID: d0b55769a3345278956eeb33fd98b1525b1ed423ca8ed2fd605d25fe2442db97
                        • Opcode Fuzzy Hash: a379eebdbbcec35e8ed859733ff2708c3a1330b01a2a2298d96069c18e9e916f
                        • Instruction Fuzzy Hash: 05118272A04249AFD714CB94DC45FABB7BDFB48B11F10411AFA05D3680DB7459048BE1
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02D22AFC
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D22B03
                          • Part of subcall function 02D22B77: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02D22B8C
                          • Part of subcall function 02D22B77: RtlAllocateHeap.NTDLL(00000000), ref: 02D22B93
                          • Part of subcall function 02D22B77: RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,02D22B10), ref: 02D22BB2
                          • Part of subcall function 02D22B77: RegQueryValueExA.ADVAPI32(02D22B10,00435094,00000000,00000000,00000000,000000FF), ref: 02D22BCC
                          • Part of subcall function 02D22B77: RegCloseKey.ADVAPI32(02D22B10), ref: 02D22BD6
                        • RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,02D19767), ref: 02D22B38
                        • RegQueryValueExA.ADVAPI32(02D19767,00638C34,00000000,00000000,00000000,000000FF), ref: 02D22B53
                        • RegCloseKey.ADVAPI32(02D19767), ref: 02D22B5D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID: Windows 11
                        • API String ID: 3225020163-2517555085
                        • Opcode ID: 6afc374b1021e13fac2369d4108616fa2db62d40761026aa18e21b5f00d63e66
                        • Instruction ID: ca76990682a0314a86c4769ed70abb166501f70b52cc0075e3a0d24f8ce2d6e7
                        • Opcode Fuzzy Hash: 6afc374b1021e13fac2369d4108616fa2db62d40761026aa18e21b5f00d63e66
                        • Instruction Fuzzy Hash: 4701AD71600318BFD7149BA4AC8DEEA777EEB44319F001159FE09D7294DAB09D488BE0
                        APIs
                          • Part of subcall function 02D07A37: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 02D07A6C
                          • Part of subcall function 02D07A37: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 02D07AB1
                          • Part of subcall function 02D07A37: strlen.MSVCRT ref: 02D07AE5
                          • Part of subcall function 02D07A37: StrStrA.SHLWAPI(?,00434AC4), ref: 02D07B1F
                          • Part of subcall function 02D07A37: strcpy_s.MSVCRT ref: 02D07B48
                          • Part of subcall function 02D07A37: GetProcessHeap.KERNEL32(00000000,00000000), ref: 02D07B53
                          • Part of subcall function 02D07A37: HeapFree.KERNEL32(00000000), ref: 02D07B5A
                          • Part of subcall function 02D07A37: strlen.MSVCRT ref: 02D07B67
                        • lstrcat.KERNEL32(00638E68,00434AD4), ref: 02D07CF7
                        • lstrcat.KERNEL32(00638E68,?), ref: 02D07D24
                        • lstrcat.KERNEL32(00638E68,00434AD8), ref: 02D07D36
                        • lstrcat.KERNEL32(00638E68,?), ref: 02D07D57
                        • wsprintfA.USER32 ref: 02D07D77
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D07DA0
                        • lstrcat.KERNEL32(00638E68,00000000), ref: 02D07DAE
                        • lstrcat.KERNEL32(00638E68,00434AD4), ref: 02D07DC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                        • String ID:
                        • API String ID: 2460923012-0
                        • Opcode ID: 0e9693a24bed11132ccf272c91ee3e2d1e75641051f5d3aaf3441a98692b6c9b
                        • Instruction ID: f916fad4f8e5c40cbe7104873f1025a7e7b04983e3aa514bcfa8d6ed020be2f7
                        • Opcode Fuzzy Hash: 0e9693a24bed11132ccf272c91ee3e2d1e75641051f5d3aaf3441a98692b6c9b
                        • Instruction Fuzzy Hash: B8315072A00214EFDB14DBA4DC84AEAF7BAEB88714F245519E605973A0DB74FD41CBB0
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D26191
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D261B0
                        • memmove.MSVCRT(FFFFFFFF,00000000,00000000,?,?,00000000), ref: 02D2620B
                        • memcpy.MSVCRT(00000010,?,?), ref: 02D2622F
                        • memcpy.MSVCRT(00000000,?,?), ref: 02D26244
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D26337
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$memcpy$memmove
                        • String ID:
                        • API String ID: 1795094292-0
                        • Opcode ID: e6179c5956032c574cca8a21006d3bb142d8d43170353399e0bdbb27710f718b
                        • Instruction ID: 0bb9f6e85c2372df3ac6d5a53f30061b0820239fbe27f7a5361f26ca9f609187
                        • Opcode Fuzzy Hash: e6179c5956032c574cca8a21006d3bb142d8d43170353399e0bdbb27710f718b
                        • Instruction Fuzzy Hash: DF614170B00364DBDB29CF5CC994A5EB7BAEF94708B648919E49287381D730ED48C7D4
                        APIs
                        • memset.MSVCRT ref: 02D0A0D6
                        • LocalAlloc.KERNEL32(00000040), ref: 02D0A10E
                          • Part of subcall function 02D27447: lstrcpy.KERNEL32(00000000,ERROR), ref: 02D27465
                        • lstrcpy.KERNEL32(00000000,00434C44), ref: 02D0A219
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$AllocLocalmemset
                        • String ID: <LC$@
                        • API String ID: 4098468873-2262423216
                        • Opcode ID: 6335f0d9757b7b5ca50d81dcc714d0bcf26536528517a69c20e34ba10e077ae9
                        • Instruction ID: a6e7d0f3b3098486efd954f88679871b503b39c8b5f3e9d2c43f8c407fe6cf87
                        • Opcode Fuzzy Hash: 6335f0d9757b7b5ca50d81dcc714d0bcf26536528517a69c20e34ba10e077ae9
                        • Instruction Fuzzy Hash: C051B071A012599BDB10EF64DCC8BDDB7A5EF44318F254165EE08AB3A0DB70ED05CBA0
                        APIs
                        • memset.MSVCRT ref: 02D1DA3D
                        • RegOpenKeyExA.ADVAPI32(80000001,00638CD8,00000000,00020119,?), ref: 02D1DA5C
                        • RegQueryValueExA.ADVAPI32(?,006388D4,00000000,00000000,00000000,000000FF), ref: 02D1DA80
                        • RegCloseKey.ADVAPI32(?), ref: 02D1DA8A
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1DAAF
                        • lstrcat.KERNEL32(?,00638968), ref: 02D1DAC3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$CloseOpenQueryValuememset
                        • String ID:
                        • API String ID: 2623679115-0
                        • Opcode ID: ac4654c9b423e5f92f1e0f5bbd4689b147bb9237eec9d2d29ba4c608ca516213
                        • Instruction ID: 9584f88a94533b9f8ec8f44f25715d8483bc38b0666631c40ff9d153db4bc588
                        • Opcode Fuzzy Hash: ac4654c9b423e5f92f1e0f5bbd4689b147bb9237eec9d2d29ba4c608ca516213
                        • Instruction Fuzzy Hash: F041FB75A00249AFDB58EB64DC85FDDB776EF54304F108064A909973A0EB70AE89CFE1
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 02D09F0F
                        • LocalAlloc.KERNEL32(00000040,?), ref: 02D09F41
                        • StrStrA.SHLWAPI(00000000,00434C20), ref: 02D09F6A
                        • memcmp.MSVCRT(?,0042D674,00000005), ref: 02D09FA3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocLocallstrcpymemcmp
                        • String ID: $4LC
                        • API String ID: 4154055062-3100163359
                        • Opcode ID: 2ed3606612dab47c49cc27d7fca0ee64b50a397eb7eb53d0e2c7cd4a10305d8a
                        • Instruction ID: 7dd8a3180f917dff43d164580547c14cd1ab4972b5d4670cea2c30f1746834df
                        • Opcode Fuzzy Hash: 2ed3606612dab47c49cc27d7fca0ee64b50a397eb7eb53d0e2c7cd4a10305d8a
                        • Instruction Fuzzy Hash: 55418F71A012459BCB10AF65CCD8BEEBBB5EF44708F148064ED05973E6EB30AD05CBA0
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1EC8B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1ECBA
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1ECC8
                        • lstrcat.KERNEL32(?,00431794), ref: 02D1ECE1
                        • lstrcat.KERNEL32(?,00638DF8), ref: 02D1ECF4
                        • lstrcat.KERNEL32(?,00431794), ref: 02D1ED06
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FolderPathlstrcpy
                        • String ID:
                        • API String ID: 818526691-0
                        • Opcode ID: 24efa4d62bf1b18e58e6653d9f447b2f22108c514c91e68fd26aaca9e1d00bc0
                        • Instruction ID: 2750cb0ab0f7cb2de29a21fc7640a1eaba524c9df63400e8618385cab7f10211
                        • Opcode Fuzzy Hash: 24efa4d62bf1b18e58e6653d9f447b2f22108c514c91e68fd26aaca9e1d00bc0
                        • Instruction Fuzzy Hash: 3C416575A00159ABCB15EB64DC89FED77B6EF48300F1044A8BA1997390DF709E48CFA4
                        APIs
                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,02D01675), ref: 02D09D01
                        • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,02D01675), ref: 02D09D17
                        • LocalAlloc.KERNEL32(00000040,?,?,?,?,02D01675), ref: 02D09D2E
                        • ReadFile.KERNEL32(00000000,00000000,?,02D01675,00000000,?,?,?,02D01675), ref: 02D09D47
                        • LocalFree.KERNEL32(?,?,?,?,02D01675), ref: 02D09D67
                        • CloseHandle.KERNEL32(00000000,?,?,?,02D01675), ref: 02D09D6E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                        • String ID:
                        • API String ID: 2311089104-0
                        • Opcode ID: 18fe08c416d9db512f6576e54d93a0197b66446ba9587125c2374a8c0eafa297
                        • Instruction ID: 86189a6b4af0d8fa39ca5b7a87b5624cb6f00d72078b49791a77f59fa063d131
                        • Opcode Fuzzy Hash: 18fe08c416d9db512f6576e54d93a0197b66446ba9587125c2374a8c0eafa297
                        • Instruction Fuzzy Hash: 4C114C71640205AFE7109FA8DCD8BAA736EEB04B44F104119B915972E1EB70AD40CBB0
                        APIs
                        • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,0040140E), ref: 00409A9A
                        • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,0040140E), ref: 00409AB0
                        • LocalAlloc.KERNEL32(00000040,?,?,?,?,0040140E), ref: 00409AC7
                        • ReadFile.KERNEL32(00000000,00000000,?,0040140E,00000000,?,?,?,0040140E), ref: 00409AE0
                        • LocalFree.KERNEL32(?,?,?,?,0040140E), ref: 00409B00
                        • CloseHandle.KERNEL32(00000000,?,?,?,0040140E), ref: 00409B07
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                        • String ID:
                        • API String ID: 2311089104-0
                        • Opcode ID: 8c3de4b5f7d7000f0aa90acc772a5ffcb979225bf9b87a846b24b1fb6ecb3daa
                        • Instruction ID: e07bc1cf37077e01f74a08ddf4965744106ae1532c602a75826c3d4cb70f4bb0
                        • Opcode Fuzzy Hash: 8c3de4b5f7d7000f0aa90acc772a5ffcb979225bf9b87a846b24b1fb6ecb3daa
                        • Instruction Fuzzy Hash: 97115E71600209AFE710DFA9DDC8AAB737DFB44350F10016AF901A72C1EB74AD50CBA4
                        APIs
                        • GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,?), ref: 02D23531
                        • GetLastError.KERNEL32 ref: 02D2353B
                          • Part of subcall function 02D24037: GetProcessHeap.KERNEL32(00000000,?,02D077DF), ref: 02D2403E
                          • Part of subcall function 02D24037: HeapFree.KERNEL32(00000000), ref: 02D24045
                        • wsprintfA.USER32 ref: 02D235D6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$ErrorFreeInformationLastLogicalProcessProcessorwsprintf
                        • String ID: LC$LC
                        • API String ID: 879827129-528129335
                        • Opcode ID: 1ef1ddb4c12de8c9f3ef3063e2eee2503ff2e2806c72726b2705e383ada50cfd
                        • Instruction ID: 622babe4e3a51fe72d2ffa5fd284e30de17f07f6050e08cc3a6a2fbe78d55679
                        • Opcode Fuzzy Hash: 1ef1ddb4c12de8c9f3ef3063e2eee2503ff2e2806c72726b2705e383ada50cfd
                        • Instruction Fuzzy Hash: 2B319071E006299BCB20CF99D940BAEFBB9FB44B58F10416AE909E3340D7399E05CBD1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00408996
                          • Part of subcall function 0042A1C0: std::exception::exception.LIBCMT ref: 0042A1D5
                          • Part of subcall function 0042A1C0: __CxxThrowException@8.LIBCMT ref: 0042A1EA
                        • std::_Xinvalid_argument.LIBCPMT ref: 004089CD
                          • Part of subcall function 0042A173: std::exception::exception.LIBCMT ref: 0042A188
                          • Part of subcall function 0042A173: __CxxThrowException@8.LIBCMT ref: 0042A19D
                        • memcpy.MSVCRT(?,00000000,?,00000000,?,?,004087D0,?,00000000,00407897), ref: 00408A2B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception$memcpy
                        • String ID: invalid string position$string too long
                        • API String ID: 2202983795-4289949731
                        • Opcode ID: 1264ccbffb2aa92ebc0bc6e859d9636bdb236cf983a90bf21c88a9af95831ad1
                        • Instruction ID: 619a558a3a3e20f965be59c2784b6be23361322c52313efc36a838b10db45757
                        • Opcode Fuzzy Hash: 1264ccbffb2aa92ebc0bc6e859d9636bdb236cf983a90bf21c88a9af95831ad1
                        • Instruction Fuzzy Hash: 2621F8723006508BC720AA5CE940A6AF7A5DBA1761B10053FF1C1DB6C1CB75D851C7ED
                        APIs
                        • memcpy.MSVCRT(?,00407590,00000040,02D076F4), ref: 02D07167
                        • memcpy.MSVCRT(?,00005A4D,000000F8,00000000), ref: 02D071A3
                        • GetProcessHeap.KERNEL32(00000008,?), ref: 02D071DB
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D071E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heapmemcpy$AllocateProcess
                        • String ID: @
                        • API String ID: 966719176-2766056989
                        • Opcode ID: 69f325cfa0226fa075afd252caf388089ea43902eca3c4d2321855712a9bd385
                        • Instruction ID: 1352d9b4015152c2be4238c18aa1230a2f8f7f0f066698093fff67efc7662c2c
                        • Opcode Fuzzy Hash: 69f325cfa0226fa075afd252caf388089ea43902eca3c4d2321855712a9bd385
                        • Instruction Fuzzy Hash: C6216D706006019BEB248F65DC84BBAB3E4FB44705F84846CEA56CB794E7B8E945CB51
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: CodeInfoPageValidmemset
                        • String ID:
                        • API String ID: 703783727-0
                        • Opcode ID: 723d371ac7c3af6d3a7356f972ce84e78fe6a0c18b4a2c6fb9deb1576fde27db
                        • Instruction ID: e95db60ca12fb5da23bb557667d239563f746849ff472d352f522c0cc6246d10
                        • Opcode Fuzzy Hash: 723d371ac7c3af6d3a7356f972ce84e78fe6a0c18b4a2c6fb9deb1576fde27db
                        • Instruction Fuzzy Hash: 4431E9709042A59EE7259F34C8A43F9BF909F6131DF2489AED891CB391C325CC0EC761
                        APIs
                        • GetSystemTime.KERNEL32(?), ref: 02D21DD9
                          • Part of subcall function 02D21A87: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D21AB6
                          • Part of subcall function 02D21A87: lstrlen.KERNEL32(00638DEC), ref: 02D21AC7
                          • Part of subcall function 02D21A87: lstrcpy.KERNEL32(00000000,00000000), ref: 02D21AEE
                          • Part of subcall function 02D21A87: lstrcat.KERNEL32(00000000,00000000), ref: 02D21AF9
                          • Part of subcall function 02D21A87: lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B28
                          • Part of subcall function 02D21A87: lstrlen.KERNEL32(00434F9C), ref: 02D21B3A
                          • Part of subcall function 02D21A87: lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B5B
                          • Part of subcall function 02D21A87: lstrcat.KERNEL32(00000000,00434F9C), ref: 02D21B67
                          • Part of subcall function 02D21A87: lstrcpy.KERNEL32(00000000,00000000), ref: 02D21B96
                        • sscanf.NTDLL ref: 02D21E01
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 02D21E1D
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 02D21E2D
                        • ExitProcess.KERNEL32 ref: 02D21E4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                        • String ID:
                        • API String ID: 3040284667-0
                        • Opcode ID: d3585bb41137a9862eec331790d52422d97d6d4fde1bfc123c1fde79e799ec0a
                        • Instruction ID: ee39088d26241bbd3eb14788514d785a3c5b8638b0351774d0128f0223f5eb81
                        • Opcode Fuzzy Hash: d3585bb41137a9862eec331790d52422d97d6d4fde1bfc123c1fde79e799ec0a
                        • Instruction Fuzzy Hash: 2B21C2B1508301AF8354DF69D88495BBBF9EED8314F409A1EF599C3260E770D9098FA6
                        APIs
                        • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00421EA0), ref: 00421B72
                          • Part of subcall function 00421820: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 0042184F
                          • Part of subcall function 00421820: lstrlenA.KERNEL32(02DF40E0,00000000,00000000,?,?,00421B81), ref: 00421860
                          • Part of subcall function 00421820: lstrcpy.KERNEL32(00000000,00000000), ref: 00421887
                          • Part of subcall function 00421820: lstrcatA.KERNEL32(00000000,00000000), ref: 00421892
                          • Part of subcall function 00421820: lstrcpy.KERNEL32(00000000,00000000), ref: 004218C1
                          • Part of subcall function 00421820: lstrlenA.KERNEL32(00434F9C,?,?,00421B81), ref: 004218D3
                          • Part of subcall function 00421820: lstrcpy.KERNEL32(00000000,00000000), ref: 004218F4
                          • Part of subcall function 00421820: lstrcatA.KERNEL32(00000000,00434F9C,?,?,00421B81), ref: 00421900
                          • Part of subcall function 00421820: lstrcpy.KERNEL32(00000000,00000000), ref: 0042192F
                        • sscanf.NTDLL ref: 00421B9A
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421BB6
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00421BC6
                        • ExitProcess.KERNEL32 ref: 00421BE3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                        • String ID:
                        • API String ID: 3040284667-0
                        • Opcode ID: 70fb3db3e554c7d51a6d87790ab4f5262d78885ef9ced18a5adf94f503b7bf3d
                        • Instruction ID: 276e4b54b55f1c3fc1aac48e3fc79cc90fd1a426ff4117ad04e9df3e7fe316e2
                        • Opcode Fuzzy Hash: 70fb3db3e554c7d51a6d87790ab4f5262d78885ef9ced18a5adf94f503b7bf3d
                        • Instruction Fuzzy Hash: A72102B1508301AF8344EF69D88485BBBF9EED8304F409A1EF599C3220E774E508CFA6
                        APIs
                        • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 02D012AD
                        • VirtualAllocExNuma.KERNEL32(00000000), ref: 02D012B4
                        • ExitProcess.KERNEL32 ref: 02D012BF
                        • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004), ref: 02D012D3
                        • VirtualFree.KERNEL32(00000000,17C841C0,00008000), ref: 02D01312
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Virtual$AllocProcess$CurrentExitFreeNuma
                        • String ID:
                        • API String ID: 3477276466-0
                        • Opcode ID: eebbf2a7d8a8f00017b338c7aa3164428bececb1a666839850d6e3d3436eabea
                        • Instruction ID: 4816fa582618cd86ea22e5143b71f709bf4d26785cd47829bdeaa6e658b23f91
                        • Opcode Fuzzy Hash: eebbf2a7d8a8f00017b338c7aa3164428bececb1a666839850d6e3d3436eabea
                        • Instruction Fuzzy Hash: 6901F4717403047BEB144AB56C5EF6B77EEA785B05F209019F708E73D0DAB1E9008AB8
                        APIs
                        • memcpy.MSVCRT(?,?,00000040), ref: 00406F00
                        • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406F3C
                        • GetProcessHeap.KERNEL32(00000008,?), ref: 00406F74
                        • HeapAlloc.KERNEL32(00000000), ref: 00406F7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heapmemcpy$AllocProcess
                        • String ID: @
                        • API String ID: 1643994569-2766056989
                        • Opcode ID: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                        • Instruction ID: e1db0f0f00307df363e64ad8a88bb248863c5a506cdc1b59983cb41b111b7395
                        • Opcode Fuzzy Hash: 9d0aa672cad1b422e85df3b0c0ffa8adf9295387143c5de3d490c1a63fad8456
                        • Instruction Fuzzy Hash: 92118E70600602CBDB258F60DD84BBB73A4EB40704F054839F946DB6C4FBB8E955CB68
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 02D22B8C
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D22B93
                        • RegOpenKeyExA.ADVAPI32(80000002,00638B98,00000000,00020119,02D22B10), ref: 02D22BB2
                        • RegQueryValueExA.ADVAPI32(02D22B10,00435094,00000000,00000000,00000000,000000FF), ref: 02D22BCC
                        • RegCloseKey.ADVAPI32(02D22B10), ref: 02D22BD6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3225020163-0
                        • Opcode ID: 5364e14c0a3d05156664c7df2c62bb00f5e878ba2183d47dff6cc4ea0b38e43d
                        • Instruction ID: 92bc4a846d80b726246669518c189db3c0907ca1bddda1b3e19e8f2f6d47b0e2
                        • Opcode Fuzzy Hash: 5364e14c0a3d05156664c7df2c62bb00f5e878ba2183d47dff6cc4ea0b38e43d
                        • Instruction Fuzzy Hash: 7801B175A00358AFD714CFA49C49FEB7BBDEB48759F200098FE4597245EB715908CBA0
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D0139C
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D013A3
                        • RegOpenKeyExA.ADVAPI32(80000001,00431754,00000000,00020119,?), ref: 02D013C0
                        • RegQueryValueExA.ADVAPI32(?,00431748,00000000,00000000,00000000,000000FF), ref: 02D013DA
                        • RegCloseKey.ADVAPI32(?), ref: 02D013E4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                        • String ID:
                        • API String ID: 3225020163-0
                        • Opcode ID: 6d01a78dd2703cc8c80cfc44e62c956613e7042535cbaa24fe8283e197e708bc
                        • Instruction ID: a44bee30cffa2d9f011aba8ab2c38c95b6acd9acb6add93cdb95d51ddc960e72
                        • Opcode Fuzzy Hash: 6d01a78dd2703cc8c80cfc44e62c956613e7042535cbaa24fe8283e197e708bc
                        • Instruction Fuzzy Hash: A7F01D75A40308BFD7149BA09C8DFEA7B7DEB04755F101159BE05E2290EBB05A448BE0
                        APIs
                        • __getptd.LIBCMT ref: 02D29244
                          • Part of subcall function 02D28A66: __getptd_noexit.LIBCMT ref: 02D28A69
                          • Part of subcall function 02D28A66: __amsg_exit.LIBCMT ref: 02D28A76
                        • __getptd.LIBCMT ref: 02D2925B
                        • __amsg_exit.LIBCMT ref: 02D29269
                        • __lock.LIBCMT ref: 02D29279
                        • __updatetlocinfoEx_nolock.LIBCMT ref: 02D2928D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: 20008b949afe04f4c0db9c99c0ad443aa39e2c03d8264a222539faff6a2289d1
                        • Instruction ID: 5d6559f070636aa549567d1b380699af9822e1bd8f8bb818cf8d63aa901a55e1
                        • Opcode Fuzzy Hash: 20008b949afe04f4c0db9c99c0ad443aa39e2c03d8264a222539faff6a2289d1
                        • Instruction Fuzzy Hash: DDF090339487309FEB31BB689805B8D73A2EF20B2CF604159E459A63D0DB645E48DE76
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00417C94
                        • std::_Xinvalid_argument.LIBCPMT ref: 00417CAF
                        • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,00409186,?,?,?,?,00000000,?,00001000,?), ref: 00417D04
                          • Part of subcall function 00417D40: std::_Xinvalid_argument.LIBCPMT ref: 00417D58
                          • Part of subcall function 00417D40: std::_Xinvalid_argument.LIBCPMT ref: 00417D76
                          • Part of subcall function 00417D40: std::_Xinvalid_argument.LIBCPMT ref: 00417D91
                          • Part of subcall function 00417D40: memcpy.MSVCRT(?,?,?,00000000,?,?,00417C7A,00000000,?,?,00000000,?,00409186,?), ref: 00417DF4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$memcpy
                        • String ID: string too long
                        • API String ID: 2304785028-2556327735
                        • Opcode ID: e41a4c39e7b4d0e0147c01b60b6cfe30a49696396de7ca50b3185aa1218136c2
                        • Instruction ID: 7b95a4aced9dd860c02d356ce7332eab408be2573d525a5934f6cc14bc449fbc
                        • Opcode Fuzzy Hash: e41a4c39e7b4d0e0147c01b60b6cfe30a49696396de7ca50b3185aa1218136c2
                        • Instruction Fuzzy Hash: 3C31E7723082144BE7249E6CE9809ABF7F5EF91760B20452BF5428B741E7759CC183DC
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00408883
                          • Part of subcall function 0042A173: std::exception::exception.LIBCMT ref: 0042A188
                          • Part of subcall function 0042A173: __CxxThrowException@8.LIBCMT ref: 0042A19D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                        • String ID: vector<T> too long$yxxx$yxxx
                        • API String ID: 2884196479-1517697755
                        • Opcode ID: 3675c89aaac7e4bf513d3378d2b1284600e2121f734ac1cf293c303742f63245
                        • Instruction ID: 7564ff16f4fded24fea60b23033fc6fb145d6f62840a653eb56d940b242daf0a
                        • Opcode Fuzzy Hash: 3675c89aaac7e4bf513d3378d2b1284600e2121f734ac1cf293c303742f63245
                        • Instruction Fuzzy Hash: FD31B7B5E005159BCB08DF58C9906AEBBB6EB88350F14827EE905EB384DB34AD01CBD5
                        APIs
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1F12A
                        • StrCmpCA.SHLWAPI(?,ERROR), ref: 02D1F145
                        • lstrcpy.KERNEL32(00000000,ERROR), ref: 02D1F1A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID: ERROR
                        • API String ID: 3722407311-2861137601
                        • Opcode ID: ce871ecde8db7cfc3056d6aeb74e55e33849ac66478390f3a1a41166bfceedc7
                        • Instruction ID: d908ebdc9faaa285920105aa2dc68ccba5d6cf100ce313d6c0b99fbc3c6d8f11
                        • Opcode Fuzzy Hash: ce871ecde8db7cfc3056d6aeb74e55e33849ac66478390f3a1a41166bfceedc7
                        • Instruction Fuzzy Hash: 9921BFB56112865FDB10BF79DC8CB9977A5EF14308F108414AC49DBB61EB34EC54CBA4
                        APIs
                        • GetUserDefaultLocaleName.KERNEL32(00000000,00000055,00000000,00000000,?), ref: 02D22F6B
                        • LocalAlloc.KERNEL32(00000040,00000005), ref: 02D22F79
                        • CharToOemW.USER32(?,00000000), ref: 02D22F89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocCharDefaultLocalLocaleNameUser
                        • String ID: 8LC
                        • API String ID: 2580910410-1713405209
                        • Opcode ID: 8d1da2be3ba6f1f09b22f2d10e9c0f53e0352e1882bf407210536c68e11c4cf7
                        • Instruction ID: 0c8c7f85c901027f0a707ee9241040d0c4b331b63748346a3836130a7307da10
                        • Opcode Fuzzy Hash: 8d1da2be3ba6f1f09b22f2d10e9c0f53e0352e1882bf407210536c68e11c4cf7
                        • Instruction Fuzzy Hash: 4001A272B44718ABD720CB59EC45FAAF7B8F744B21F0042AEFD09D3780D77959048AA1
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?), ref: 02D22D66
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D22D6D
                        • GetComputerNameA.KERNEL32(00000000,00000104), ref: 02D22D81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateComputerNameProcess
                        • String ID: 8LC
                        • API String ID: 1664310425-1713405209
                        • Opcode ID: 0be16655d1dcf82a79328a1c088b057431a11f06d39f8fcbc5b2efcdb50dc0fe
                        • Instruction ID: 69fe2cf0e4db3b6f8317fecbd9417d00e25b0c9e03b198add71d18096c57f5c3
                        • Opcode Fuzzy Hash: 0be16655d1dcf82a79328a1c088b057431a11f06d39f8fcbc5b2efcdb50dc0fe
                        • Instruction Fuzzy Hash: A901A272A44618ABC710CF99ED45B9DB7B8F744B21F00026AFD15D3780D77819048AE1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00408737
                          • Part of subcall function 0042A173: std::exception::exception.LIBCMT ref: 0042A188
                          • Part of subcall function 0042A173: __CxxThrowException@8.LIBCMT ref: 0042A19D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                        • String ID: vector<T> too long$yxxx$yxxx
                        • API String ID: 2884196479-1517697755
                        • Opcode ID: 553b742820cae0223f32763f78b48b2837723d7804ef9764059221064cc10c22
                        • Instruction ID: 6a050c7182ba86e4f9edcf12540e1962beac915d64326d2362294264bf04d6a9
                        • Opcode Fuzzy Hash: 553b742820cae0223f32763f78b48b2837723d7804ef9764059221064cc10c22
                        • Instruction Fuzzy Hash: F3F06D27B040210BC214643E9E8449EA94657E539037AD67AE89AFF399DC74EC8285D9
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C327
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 990b93a8a18fa2f5a96702095e37316979256c73fb938d0512626cd5623d606f
                        • Instruction ID: f0e8ad70b0de0a83b710a0eceabd5931686554b1f5519c2a8ee10ab0fbb35489
                        • Opcode Fuzzy Hash: 990b93a8a18fa2f5a96702095e37316979256c73fb938d0512626cd5623d606f
                        • Instruction Fuzzy Hash: 5B319C71A11285ABCB11EBA4EC8CB6DB7BAEB40308F148466E804D7790DB749C05CFA6
                        APIs
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1EF46
                        • lstrlen.KERNEL32(00000000), ref: 02D1EF5D
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1EF84
                        • lstrlen.KERNEL32(00000000), ref: 02D1EF8B
                        • lstrcpy.KERNEL32(00000000,00434F88), ref: 02D1EFB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrlen
                        • String ID:
                        • API String ID: 367037083-0
                        • Opcode ID: d1b9335e12789eaac1d9ee0706117bfeac593b198cce3fc6bdeff1fa0ee0b2ad
                        • Instruction ID: 4e494f7805fb4eb120fe9d5ce61efcb54a48ceb5e0543b6237ea9ff1ff4d8862
                        • Opcode Fuzzy Hash: d1b9335e12789eaac1d9ee0706117bfeac593b198cce3fc6bdeff1fa0ee0b2ad
                        • Instruction Fuzzy Hash: 86313A75A025966BC711BB38EC8CE5DBBA6EF50308F158560BC049B7A1EB24DC09CFA5
                        APIs
                          • Part of subcall function 02D27447: lstrcpy.KERNEL32(00000000,ERROR), ref: 02D27465
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02D23CFD
                        • Process32First.KERNEL32(00000000,00000128), ref: 02D23D10
                        • Process32Next.KERNEL32(00000000,00000128), ref: 02D23D26
                          • Part of subcall function 02D27577: lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                          • Part of subcall function 02D27577: lstrcpy.KERNEL32(00000000), ref: 02D275A6
                          • Part of subcall function 02D27577: lstrcat.KERNEL32(?,------), ref: 02D275B0
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                        • CloseHandle.KERNEL32(00000000), ref: 02D23E5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                        • String ID:
                        • API String ID: 1066202413-0
                        • Opcode ID: 49579a6b685d4f0f0103baf5644634ac2fcfc3f96350a6441b66680175cd71cd
                        • Instruction ID: 6117e57c0c4765ed873ad1d5ddaf1a5b00e25420fe94db5d2539e34915823dfe
                        • Opcode Fuzzy Hash: 49579a6b685d4f0f0103baf5644634ac2fcfc3f96350a6441b66680175cd71cd
                        • Instruction Fuzzy Hash: C081E170900225CFD765CF18D948B95B7B1FB54328F29C1E9D4099B3A2D77A9C8ACF90
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1E7AB
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1E7DA
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1E7E8
                        • lstrcat.KERNEL32(?,00638B00), ref: 02D1E803
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FolderPathlstrcpy
                        • String ID:
                        • API String ID: 818526691-0
                        • Opcode ID: 11d9f56744845d9c53a32895c8ee140a75e32675b654f084e6722e1bd12f0c18
                        • Instruction ID: 148c1da2407feca340f40935b54fd07850a1de16f35ae55dad7f60f94cf7fd5c
                        • Opcode Fuzzy Hash: 11d9f56744845d9c53a32895c8ee140a75e32675b654f084e6722e1bd12f0c18
                        • Instruction Fuzzy Hash: D55161B5A00119AFDB15EB64DC85FFD777AEB48300F544499BA0997390EE70AE44CFA0
                        APIs
                        • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00064000,00000000), ref: 02D224E9
                        • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 02D225C5
                        • VirtualQueryEx.KERNEL32(00000000,?,?,0000001C), ref: 02D22627
                        • ??_V@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D22706), ref: 02D22639
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: MemoryProcessRead$QueryVirtual
                        • String ID:
                        • API String ID: 268806267-0
                        • Opcode ID: bf9dd57763a3536566a065c2bc79d4865df21d204336eefc4a2e144d3d7958f7
                        • Instruction ID: 713be16ff422f3d2e32fa28e8d41d4713416dd35fdffb3303649febd7b5fdfae
                        • Opcode Fuzzy Hash: bf9dd57763a3536566a065c2bc79d4865df21d204336eefc4a2e144d3d7958f7
                        • Instruction Fuzzy Hash: 7641CF71A002699BDB10CFA4D8A8BAE77BAFB94718F148129FD15D7340D370ED45CB90
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 02D04D02
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D04D09
                        • strlen.MSVCRT ref: 02D04D96
                        • VirtualProtect.KERNEL32(00000000,00000004,00000100,?), ref: 02D04E17
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateProcessProtectVirtualstrlen
                        • String ID:
                        • API String ID: 2355128949-0
                        • Opcode ID: 045d89fccd1938906dd098eb9d538f982648d72d25a4e93490e98aa75e76be42
                        • Instruction ID: 34ed97c730631b1a3a37931faeb18e2c8d785e59664ed7a8294daaeed6a30b3d
                        • Opcode Fuzzy Hash: 045d89fccd1938906dd098eb9d538f982648d72d25a4e93490e98aa75e76be42
                        • Instruction Fuzzy Hash: 6A31E3A8B80228768620EBFB4C4BF9F7E55DFCC760F215097751857180C9A96681CBEA
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D17FBF
                          • Part of subcall function 02D2A427: std::exception::exception.LIBCMT ref: 02D2A43C
                          • Part of subcall function 02D2A427: __CxxThrowException@8.LIBCMT ref: 02D2A451
                          • Part of subcall function 02D2A427: std::exception::exception.LIBCMT ref: 02D2A462
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D17FDD
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D17FF8
                        • memcpy.MSVCRT(?,?,?,00000000,?,?,02D17EE1,00000000,?,?,00000000,?,02D093ED,?), ref: 02D1805B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throwmemcpy
                        • String ID:
                        • API String ID: 285807467-0
                        • Opcode ID: 7e47054b543add41ed036c20b3e7533534c3db14565d3586dec7f27f450a48db
                        • Instruction ID: f7a4306eaeae522c158dae92c361614dd40b4f8a993d38109dcbc27da7a1a788
                        • Opcode Fuzzy Hash: 7e47054b543add41ed036c20b3e7533534c3db14565d3586dec7f27f450a48db
                        • Instruction Fuzzy Hash: E12195313006049FE324DE6CE880B2AF7E6EB95714F20462EE492CBB91D7B1DC44D764
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02D1EE1B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D1EE4A
                        • lstrcat.KERNEL32(?,00000000), ref: 02D1EE58
                        • lstrcat.KERNEL32(?,00638930), ref: 02D1EE73
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcat$FolderPathlstrcpy
                        • String ID:
                        • API String ID: 818526691-0
                        • Opcode ID: f44c8fe01b78bf9ffe9778e429b03f31e3d3676987f01a2fac21585407633bc3
                        • Instruction ID: 585d9f7a0ece6e698bf8f90710197f6f317756f33bcb1ad204a07fd1abc0042c
                        • Opcode Fuzzy Hash: f44c8fe01b78bf9ffe9778e429b03f31e3d3676987f01a2fac21585407633bc3
                        • Instruction Fuzzy Hash: BA3141B5A01159ABCB14EF64DC89FED77B6EF48300F1044A9BA1997390DE70AE44CFA4
                        APIs
                        • strtok_s.MSVCRT ref: 02D1CACC
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1CB09
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1CB38
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$strtok_s
                        • String ID:
                        • API String ID: 2610293679-0
                        • Opcode ID: f6f4934636fa2bed32cbaac12c325caa80a576f0d73aa55247a7f522c4cf719a
                        • Instruction ID: 028550fe392ce95cf5bda1e837c22cb8c707df5f5277ae62f7734857cafde2b3
                        • Opcode Fuzzy Hash: f6f4934636fa2bed32cbaac12c325caa80a576f0d73aa55247a7f522c4cf719a
                        • Instruction Fuzzy Hash: E921E471E50248AFCB11EFB4ED88BAEBBB9EB08304F154066E805E7381D7749D05CBA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$lstrcpylstrlen
                        • String ID:
                        • API String ID: 348468850-0
                        • Opcode ID: 8091fbfbc130a8340db7cbb0d169d97da020a13851d1453df9935ab1b5c8b065
                        • Instruction ID: dd888a8170c7f31b303232c2ddd212a31550df6bc73ab9ab9c254cade60b67f0
                        • Opcode Fuzzy Hash: 8091fbfbc130a8340db7cbb0d169d97da020a13851d1453df9935ab1b5c8b065
                        • Instruction Fuzzy Hash: 9731DF76904245AFD712CF68EC48BAABBB4EF04300F184199E889D7755EB31DD45CB90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: memchr$memcmp
                        • String ID: @KC
                        • API String ID: 2210787808-1938018870
                        • Opcode ID: b9d862aece4ee9677d3bc088a7b11a40e3bc3b419b4930aa2c22ba220a5863d1
                        • Instruction ID: 2521f3ac681e5219c057d210d1fa4ee51e6466c1a653c2c4e3c88be56b1403ed
                        • Opcode Fuzzy Hash: b9d862aece4ee9677d3bc088a7b11a40e3bc3b419b4930aa2c22ba220a5863d1
                        • Instruction Fuzzy Hash: EC210873600214ABD715CF64EC849AB77AAEFC53247248669EC25CB745C731DD42C7E0
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcessstrtok_s
                        • String ID:
                        • API String ID: 3407564107-0
                        • Opcode ID: e00a129f6f00f9850b897fcb722e900ccc2381b3c59f46b44b003cbfcb553c26
                        • Instruction ID: 78ccc4ba686536cb8f113dba51023ec4a78d9f4bd7c6ed959c59eb8794d0e4f5
                        • Opcode Fuzzy Hash: e00a129f6f00f9850b897fcb722e900ccc2381b3c59f46b44b003cbfcb553c26
                        • Instruction Fuzzy Hash: EC015276900209FBDB10DFA4EC848DE77BAEB88305F108479F919D7250E7749E858BA5
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02D23656
                        • RtlAllocateHeap.NTDLL(00000000), ref: 02D2365D
                        • GlobalMemoryStatusEx.KERNEL32 ref: 02D23678
                        • wsprintfA.USER32 ref: 02D2369E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateGlobalMemoryProcessStatuswsprintf
                        • String ID:
                        • API String ID: 2922868504-0
                        • Opcode ID: fb51181e03ceb3a90fb71e1016e28f08c61a464ea28ebc853029e4ba336a3f6d
                        • Instruction ID: 86bfe334aa5bf781ffce3090b40e9a77823fcc770c4ea5ed23cd60bd3daca477
                        • Opcode Fuzzy Hash: fb51181e03ceb3a90fb71e1016e28f08c61a464ea28ebc853029e4ba336a3f6d
                        • Instruction Fuzzy Hash: 4901F5B1A08258AFD708DB98DD49B6EB7BDFB44710F000129F906D7380D7B89C008AA5
                        APIs
                        • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?,?,00000000,0042A3D0,000000FF), ref: 02D22DF6
                        • RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 02D22DFD
                        • GetLocalTime.KERNEL32(?,?,00000000,0042A3D0,000000FF), ref: 02D22E09
                        • wsprintfA.USER32 ref: 02D22E35
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heap$AllocateLocalProcessTimewsprintf
                        • String ID:
                        • API String ID: 377395780-0
                        • Opcode ID: 1187c665280c0081dca809d70cdac0b9e14ddbc1924146aa472259be47c606b7
                        • Instruction ID: 8c34349a47f058d6690e60c1733dac4b139ae13e761a6dd5b4e63d16ae77d0dd
                        • Opcode Fuzzy Hash: 1187c665280c0081dca809d70cdac0b9e14ddbc1924146aa472259be47c606b7
                        • Instruction Fuzzy Hash: A10140B2904628ABCB149BD9DD45FBEB7BDFB4CB11F00011AFA45A2290E7B85940C7B5
                        APIs
                        • StrCmpCA.SHLWAPI(?,00431C70), ref: 02D1CBCA
                        • StrCmpCA.SHLWAPI(?,00434C3C,?,00431C70), ref: 02D1CBE1
                        • StrCmpCA.SHLWAPI(?,00434C40,?,00434C3C,?,00431C70), ref: 02D1CBF8
                        • strtok_s.MSVCRT ref: 02D1CCEE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s
                        • String ID:
                        • API String ID: 3330995566-0
                        • Opcode ID: 50202650d3246678f72eb674bac2dd8d9b7eb456bd8fcee34b14de3847553133
                        • Instruction ID: cdca5927061a68dc461894c246f3934a9ca107624fc4f0178f1bd352edb413fd
                        • Opcode Fuzzy Hash: 50202650d3246678f72eb674bac2dd8d9b7eb456bd8fcee34b14de3847553133
                        • Instruction Fuzzy Hash: CC01A271A81115A7CB219FA1ED88BADB765EF00705F105016E801E6350E7789E45CFA6
                        APIs
                        • OpenProcess.KERNEL32(00000410,00000000), ref: 02D246F9
                        • GetModuleFileNameExA.PSAPI(00000000,00000000,?,00000104), ref: 02D24714
                        • CloseHandle.KERNEL32(00000000), ref: 02D2471B
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D2474E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: CloseFileHandleModuleNameOpenProcesslstrcpy
                        • String ID:
                        • API String ID: 4028989146-0
                        • Opcode ID: 029c60a11133292b78579776ac8f662a47e1db9485ded8d9746e7aa4106313b1
                        • Instruction ID: ecb5349574e6ab3430faeabd208089a48b14a94017d0a26489ce723299fb8c83
                        • Opcode Fuzzy Hash: 029c60a11133292b78579776ac8f662a47e1db9485ded8d9746e7aa4106313b1
                        • Instruction Fuzzy Hash: 0EF0C8B09016252BE7219B749C8CBE5BAB9DB15708F1054A4EE54D7280DBF09C88CBE0
                        APIs
                        • lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                        • lstrcpy.KERNEL32(00000000), ref: 02D275A6
                        • lstrcat.KERNEL32(?,------), ref: 02D275B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcatlstrcpylstrlen
                        • String ID: ------
                        • API String ID: 3050337572-882505780
                        • Opcode ID: adc57774bd4793d8eea96f035dc7f85e9a30f09413a88c1a063c923ae78d1415
                        • Instruction ID: 046c980960651320007adce3d36a0a168aa3ac921763db85dea9a2498bd18bda
                        • Opcode Fuzzy Hash: adc57774bd4793d8eea96f035dc7f85e9a30f09413a88c1a063c923ae78d1415
                        • Instruction Fuzzy Hash: 63F039B49013128FDB209F35D888922FBFAEF94708314982DA88AC3318EB30D840CF60
                        APIs
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                          • Part of subcall function 02D01797: lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D13689
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D136B2
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D136D8
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D136FE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 1e9be69b6d1d964f5a35dcc0e79b14959f9aa6a02d672a7784e4edeb24e27305
                        • Instruction ID: 8733b4894c9520e7c359e9210883678b3a29c7722adbb732042b369c135b8b91
                        • Opcode Fuzzy Hash: 1e9be69b6d1d964f5a35dcc0e79b14959f9aa6a02d672a7784e4edeb24e27305
                        • Instruction Fuzzy Hash: 0712FC70A012019FDB98CF19E598B25B7E5AF44728B19C0EED809DB7A6D772DC42CF90
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 004087DC
                        • memcpy.MSVCRT(?,?,00000000,00000000,00407897), ref: 00408822
                          • Part of subcall function 00408980: std::_Xinvalid_argument.LIBCPMT ref: 00408996
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_$memcpy
                        • String ID: string too long
                        • API String ID: 2304785028-2556327735
                        • Opcode ID: 20a0e1fa80b2d40189671086a8601b96c4190272eee8fccfd7a78e7d92450db4
                        • Instruction ID: b799d092ef9cae65facd334a6b89e5ae18e89b85f7d552003ee478c73589ae49
                        • Opcode Fuzzy Hash: 20a0e1fa80b2d40189671086a8601b96c4190272eee8fccfd7a78e7d92450db4
                        • Instruction Fuzzy Hash: DD21AE213106508BDB259A6C8E80A2AB3E6AB85711B74097FE0D1D77C6DF79AC40879D
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D08AEA
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A3EF
                          • Part of subcall function 02D2A3DA: __CxxThrowException@8.LIBCMT ref: 02D2A404
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A415
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                        • String ID: yxxx$yxxx
                        • API String ID: 1823113695-1021751087
                        • Opcode ID: 3675c89aaac7e4bf513d3378d2b1284600e2121f734ac1cf293c303742f63245
                        • Instruction ID: 534af2d47becac3b0468074ca73c222f7a056d1899962472a08d6dec1dedcfe8
                        • Opcode Fuzzy Hash: 3675c89aaac7e4bf513d3378d2b1284600e2121f734ac1cf293c303742f63245
                        • Instruction Fuzzy Hash: 5C3197B5E005199FCB08DF58C89079EBBB6EB88310F188269E915DB384D731AD01CBD1
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00408A75
                          • Part of subcall function 0042A173: std::exception::exception.LIBCMT ref: 0042A188
                          • Part of subcall function 0042A173: __CxxThrowException@8.LIBCMT ref: 0042A19D
                        • memcpy.MSVCRT(?,?,?), ref: 00408ABF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Exception@8ThrowXinvalid_argumentmemcpystd::_std::exception::exception
                        • String ID: string too long
                        • API String ID: 2475949303-2556327735
                        • Opcode ID: 2cecf57ea5af59452acfa892dcec981f503e4cb288e235a5eae741e3d1ec3341
                        • Instruction ID: 3089fc7e7832a89005345014d0910da57ed2333d4baad04f32cbc36f091640d4
                        • Opcode Fuzzy Hash: 2cecf57ea5af59452acfa892dcec981f503e4cb288e235a5eae741e3d1ec3341
                        • Instruction Fuzzy Hash: DB21F5317046045BEB20CE6DDA4066FB7A6EBD5320F148A3FE881D33C1DF74A9448B98
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D25B89
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A3EF
                          • Part of subcall function 02D2A3DA: __CxxThrowException@8.LIBCMT ref: 02D2A404
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A415
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D25B9C
                        Strings
                        • Sec-WebSocket-Version: 13, xrefs: 02D25B8E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                        • String ID: Sec-WebSocket-Version: 13
                        • API String ID: 963545896-4220314181
                        • Opcode ID: 72ce411f60a9603ccc78830aed89491ef0d3d3f59f8d142ff26189d7cf510ab7
                        • Instruction ID: 09a35d62de9a355948008bee0ca97877a028f4adff51dbcde9fc483d0755e8a7
                        • Opcode Fuzzy Hash: 72ce411f60a9603ccc78830aed89491ef0d3d3f59f8d142ff26189d7cf510ab7
                        • Instruction Fuzzy Hash: AB1170703047608BC3358A2CF940F1AB7E2EBE1718FA40B9DE09187784C762EC49C761
                        APIs
                        • lstrlen.KERNEL32(?,00000000,?), ref: 02D04E86
                        • InternetCrackUrlA.WININET(?,00000000), ref: 02D04E8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: CrackInternetlstrlen
                        • String ID: <
                        • API String ID: 1274457161-4251816714
                        • Opcode ID: 83350d63855a898580c196c4f361b3f244a8d67ec79f2e5ffb9c4633858592fb
                        • Instruction ID: 91548d5d8054d06df9d94939fcca87760467ac04117a51a674f7f63342aa4e9b
                        • Opcode Fuzzy Hash: 83350d63855a898580c196c4f361b3f244a8d67ec79f2e5ffb9c4633858592fb
                        • Instruction Fuzzy Hash: EB011771D00218AFDB10DFA8EC48B9EBBA9EB08360F00812AF954E7390EB7459058FD4
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 00408B8F
                          • Part of subcall function 0042A1C0: std::exception::exception.LIBCMT ref: 0042A1D5
                          • Part of subcall function 0042A1C0: __CxxThrowException@8.LIBCMT ref: 0042A1EA
                        • memmove.MSVCRT(?,?,?,?,?,004089B2,00000000,?,?,004087D0,?,00000000,00407897), ref: 00408BC5
                        Strings
                        • invalid string position, xrefs: 00408B8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Exception@8ThrowXinvalid_argumentmemmovestd::_std::exception::exception
                        • String ID: invalid string position
                        • API String ID: 655285616-1799206989
                        • Opcode ID: ac6795f25ef18eeed2e13ecde80d8ae79474f4bb620a7c1820e729909ec2ccd9
                        • Instruction ID: 53d9df9cfc3258e6a1c1fb5dc4ad9744160fc55fc09269fc7e45ec912c21b5c3
                        • Opcode Fuzzy Hash: ac6795f25ef18eeed2e13ecde80d8ae79474f4bb620a7c1820e729909ec2ccd9
                        • Instruction Fuzzy Hash: 1A0184703043004BD3258A6CEE9462AB7B6DBC5704B68493EE0D2D7785DBB8FC42879D
                        APIs
                        • std::_Xinvalid_argument.LIBCPMT ref: 02D0899E
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A3EF
                          • Part of subcall function 02D2A3DA: __CxxThrowException@8.LIBCMT ref: 02D2A404
                          • Part of subcall function 02D2A3DA: std::exception::exception.LIBCMT ref: 02D2A415
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                        • String ID: yxxx$yxxx
                        • API String ID: 1823113695-1021751087
                        • Opcode ID: 553b742820cae0223f32763f78b48b2837723d7804ef9764059221064cc10c22
                        • Instruction ID: c5b575d42cb8604a199626afec1da2d51b3e11a16d3e64c8df695f225632fe47
                        • Opcode Fuzzy Hash: 553b742820cae0223f32763f78b48b2837723d7804ef9764059221064cc10c22
                        • Instruction Fuzzy Hash: 82F0B423F040350F8314B43DADC869FA94797E425032AD722D956DF3E8E971EC82B5E6
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitGlobalMemoryProcessStatus
                        • String ID: @
                        • API String ID: 803317263-2766056989
                        • Opcode ID: f127fba7727a91b88187df4bdea323de0718f2841fffded282c9bdb05d23b48c
                        • Instruction ID: bfc378884462251a2a95c28da6887bb46c57b4d1d3e8c33008d791673b000a33
                        • Opcode Fuzzy Hash: f127fba7727a91b88187df4bdea323de0718f2841fffded282c9bdb05d23b48c
                        • Instruction Fuzzy Hash: 88F082B05083458BEF14A66498C972DB6D9DB02358F505A29DDDEC2BF0E770CC01C66B
                        APIs
                        • std::exception::operator=.LIBCMT ref: 00427482
                          • Part of subcall function 00427402: std::exception::_Tidy.LIBCMT ref: 00427412
                          • Part of subcall function 00427402: std::exception::_Copy_str.LIBCMT ref: 00427422
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::exception::_$Copy_strTidystd::exception::operator=
                        • String ID: BtB$HVC
                        • API String ID: 2698302428-2929062201
                        • Opcode ID: 2064f9a79aefac47aea97d2be971b37e961745f4f53de9829b772e1ea93b53f3
                        • Instruction ID: ca7befed4fc05bf215c2ccad8c7d361c703a10efed1f570164778f62d87aa29a
                        • Opcode Fuzzy Hash: 2064f9a79aefac47aea97d2be971b37e961745f4f53de9829b772e1ea93b53f3
                        • Instruction Fuzzy Hash: C8D0223220436467C3206A86E806B93FFC8DB413B6F44C02EF9CC47601C7B99810C7E8
                        APIs
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FolderPathSystemTime
                        • String ID:
                        • API String ID: 1816220002-0
                        • Opcode ID: be235fe9bebd4aed7a40114c52ea8964f9ede992816bb4da7868c9f3c889d5b2
                        • Instruction ID: dcdbd683d11409a7141e0b48fc16a3d1c69a2b7c6b82ec0871bff6b5b2314905
                        • Opcode Fuzzy Hash: be235fe9bebd4aed7a40114c52ea8964f9ede992816bb4da7868c9f3c889d5b2
                        • Instruction Fuzzy Hash: 94319C71911295ABDB11EFA4ECC8BADB7B2EF40308F1484A5D804A7B90DB74AD05CFA1
                        APIs
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FolderPathSystemTime
                        • String ID:
                        • API String ID: 1816220002-0
                        • Opcode ID: e439b13af971c91788a7f9ce98ef01b15bceb564fc4667b83cefc6f8dc24056b
                        • Instruction ID: 6ac5c64afb354093caf34a9b6b095eaf9b3a6507f92c64430e07d11b4999efb9
                        • Opcode Fuzzy Hash: e439b13af971c91788a7f9ce98ef01b15bceb564fc4667b83cefc6f8dc24056b
                        • Instruction Fuzzy Hash: F3319C71911255EBCB11EFA4ECC8BADB7B6EF40308F1584A5E804A7B90DB74AD05CF62
                        APIs
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FolderPathSystemTime
                        • String ID:
                        • API String ID: 1816220002-0
                        • Opcode ID: af8567e061a0f953413200cc3095a5a5c5af79d51d934afd5fcf18e0a3b63bae
                        • Instruction ID: 6e8505e475e294dcd84c8aa7fc95537383981f9e6226d038852b2c7f145fb312
                        • Opcode Fuzzy Hash: af8567e061a0f953413200cc3095a5a5c5af79d51d934afd5fcf18e0a3b63bae
                        • Instruction Fuzzy Hash: 3B31A071D11255ABCB11EFA4DCC8BADB7B6EF40308F1484A5D804A7BA0DB74AD45CF61
                        APIs
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FolderPathSystemTime
                        • String ID:
                        • API String ID: 1816220002-0
                        • Opcode ID: 84d2cc247a8b79976c523f9584967691d5091d9f9ac208a4f9fdd6843a9c4432
                        • Instruction ID: dea5b48bc6e1e6844fad04ea2b56cf41ae05c44b80d8dd3a929943442b8552d4
                        • Opcode Fuzzy Hash: 84d2cc247a8b79976c523f9584967691d5091d9f9ac208a4f9fdd6843a9c4432
                        • Instruction Fuzzy Hash: CB319F71D11255ABCB11EFA4ECC8BADB7B6EF44308F248469D804A7790DB74AD05CF61
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 02D21808
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D21840
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D21878
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D218B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 80d4689b917c98280545ae21ecec45d4bdb4df8f3cf95346bd8f9ad76fc87c25
                        • Instruction ID: 6150ab75559d1148eb91001969094b2f7b547fbac89fa3a46fea85473809b347
                        • Opcode Fuzzy Hash: 80d4689b917c98280545ae21ecec45d4bdb4df8f3cf95346bd8f9ad76fc87c25
                        • Instruction Fuzzy Hash: E421FAB4601B029BD724DF39C998B16F7E5EF54308B148A1C988AC7B51EB70E804CFA0
                        APIs
                          • Part of subcall function 02D01877: lstrcpy.KERNEL32(00000000), ref: 02D01894
                          • Part of subcall function 02D01877: lstrcpy.KERNEL32(00000000,?), ref: 02D018B6
                          • Part of subcall function 02D01877: lstrcpy.KERNEL32(00000000,?), ref: 02D018D8
                          • Part of subcall function 02D01877: lstrcpy.KERNEL32(00000000,?), ref: 02D018FA
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D017BE
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D017E0
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01802
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D01866
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 1afde8574ea894d459d100918e21e6a29778509595042a849cc3986aceadaf2e
                        • Instruction ID: 38b5157921d73968c8daedb2110e155e16189e022e442cb66f1c1242eecaba2d
                        • Opcode Fuzzy Hash: 1afde8574ea894d459d100918e21e6a29778509595042a849cc3986aceadaf2e
                        • Instruction Fuzzy Hash: 5331C5B4A01B42AFC724DF3AC588A56BBE5FF48704700492DA896C3BA0DB70F810CF90
                        APIs
                          • Part of subcall function 02D242A7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,00000000), ref: 02D242D4
                          • Part of subcall function 02D242A7: lstrcpy.KERNEL32(00000000,?), ref: 02D24309
                          • Part of subcall function 02D27527: lstrcpy.KERNEL32(00000000), ref: 02D27556
                          • Part of subcall function 02D27527: lstrcat.KERNEL32(00000000), ref: 02D27562
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$FolderPathSystemTime
                        • String ID:
                        • API String ID: 1816220002-0
                        • Opcode ID: 61a541eaa0849ea2e0d5ce0af3ecbd6ad0c35d1f0af52485b42202bd9ae5cc02
                        • Instruction ID: 3358ef4accb49d75aa4fa42779f62cdfbb68fbc49c2ccc1854ba0592d498f603
                        • Opcode Fuzzy Hash: 61a541eaa0849ea2e0d5ce0af3ecbd6ad0c35d1f0af52485b42202bd9ae5cc02
                        • Instruction Fuzzy Hash: FE31BF71D11259ABCB11EFA4DCC8BADB7B2EF40308F148465D804AB7A4DB74AD05CFA1
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 004215A1
                        • lstrcpy.KERNEL32(00000000,?), ref: 004215D9
                        • lstrcpy.KERNEL32(00000000,?), ref: 00421611
                        • lstrcpy.KERNEL32(00000000,?), ref: 00421649
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 8561c450ff5806efa9328425447984e2dfc3d00f0a6d3cbe909e2d5d3455e04e
                        • Instruction ID: d835a63f815e36da5ade85c26f075bb24775596f52dd66724b9a128e54fe9737
                        • Opcode Fuzzy Hash: 8561c450ff5806efa9328425447984e2dfc3d00f0a6d3cbe909e2d5d3455e04e
                        • Instruction Fuzzy Hash: 382127B0701B029BD724DF2AE998A17B7F5AF54700B44492EA486D7B90DB78E841CFA4
                        APIs
                          • Part of subcall function 00401610: lstrcpy.KERNEL32(00000000), ref: 0040162D
                          • Part of subcall function 00401610: lstrcpy.KERNEL32(00000000,?), ref: 0040164F
                          • Part of subcall function 00401610: lstrcpy.KERNEL32(00000000,?), ref: 00401671
                          • Part of subcall function 00401610: lstrcpy.KERNEL32(00000000,00420533), ref: 00401693
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401557
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401579
                        • lstrcpy.KERNEL32(00000000,?), ref: 0040159B
                        • lstrcpy.KERNEL32(00000000,?), ref: 004015FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 885b17a84b13c90da5186a49087c4ecc35c25859715a4917ce95556ed04e60e1
                        • Instruction ID: 80b5f1fa651da611af66416e481b020f72ab7f98df4cd08dbf14573642dabe07
                        • Opcode Fuzzy Hash: 885b17a84b13c90da5186a49087c4ecc35c25859715a4917ce95556ed04e60e1
                        • Instruction Fuzzy Hash: 7931C674A01B02AFC724DF3AC988953B7E5BF48304704492EA896D7BA0DB74F811CF94
                        APIs
                          • Part of subcall function 02D27577: lstrlen.KERNEL32(------,02D05E52), ref: 02D27582
                          • Part of subcall function 02D27577: lstrcpy.KERNEL32(00000000), ref: 02D275A6
                          • Part of subcall function 02D27577: lstrcat.KERNEL32(?,------), ref: 02D275B0
                          • Part of subcall function 02D274E7: lstrcpy.KERNEL32(00000000), ref: 02D27515
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D2410C
                          • Part of subcall function 02D240D7: lstrcpy.KERNEL32(00000000,00638AA4), ref: 02D24136
                          • Part of subcall function 02D240D7: GetSystemTime.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,02D015B5,?,0000001A), ref: 02D24140
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4B9
                        • lstrcat.KERNEL32(00000000), ref: 02D1C4C3
                        • lstrcpy.KERNEL32(00000000,00000000), ref: 02D1C4F1
                        • lstrcpy.KERNEL32(00000000,0042CFEC), ref: 02D1C539
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy$lstrcat$SystemTimelstrlen
                        • String ID:
                        • API String ID: 3486790982-0
                        • Opcode ID: 6395358b8028805ab7ed5dd252d1eb9a617b945a9a4610eb8dec3195b28e5f96
                        • Instruction ID: 54b08f511908f7e47f6665bcc1c47e011bdc6eacb97bdbd15b390e46b42c2073
                        • Opcode Fuzzy Hash: 6395358b8028805ab7ed5dd252d1eb9a617b945a9a4610eb8dec3195b28e5f96
                        • Instruction Fuzzy Hash: D6218D71911245ABCB11EFA4E8C8BADB7B6EB44308F144469E404A77A0DB74AD05CFA1
                        APIs
                        • memcpy.MSVCRT(?,?,00000040), ref: 00406F00
                        • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00406F3C
                        • GetProcessHeap.KERNEL32(00000008,?), ref: 00406F74
                        • HeapAlloc.KERNEL32(00000000), ref: 00406F7B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: Heapmemcpy$AllocProcess
                        • String ID:
                        • API String ID: 1643994569-0
                        • Opcode ID: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                        • Instruction ID: 3489786ad6ffc592b33c98b5093e94c05e4d8cefe55189094fd4c73ee0e5810c
                        • Opcode Fuzzy Hash: 0f7b886846e76426d6cbee1e2efefd49dca9b7f6cc258be776eaadaa1a2d8544
                        • Instruction Fuzzy Hash: 8B216D706106029BDB248B21DD84BBB73E8EB40704F44487DF946DBA84FBB9E956CB64
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 02D01894
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D018B6
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D018D8
                        • lstrcpy.KERNEL32(00000000,?), ref: 02D018FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1651900103.0000000002D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2d00000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: a850a7e5ed72b0bb27d1bfac9c252af4a5a53a90ad6aee72d6a55d070e261114
                        • Instruction ID: b071b6e49732d5c43a2aaa6ff6b74bf93f8890e17365951bc21d489e4c362106
                        • Opcode Fuzzy Hash: a850a7e5ed72b0bb27d1bfac9c252af4a5a53a90ad6aee72d6a55d070e261114
                        • Instruction Fuzzy Hash: 3D110074A117026BD7249F35D89CA26B7E9FF443057044A2C985AC3B90DB70E800CFA4
                        APIs
                        • lstrcpy.KERNEL32(00000000), ref: 0040162D
                        • lstrcpy.KERNEL32(00000000,?), ref: 0040164F
                        • lstrcpy.KERNEL32(00000000,?), ref: 00401671
                        • lstrcpy.KERNEL32(00000000,00420533), ref: 00401693
                        Memory Dump Source
                        • Source File: 00000000.00000002.1650494052.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1650494052.0000000000443000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000044B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000046E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000048E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000493000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004DA000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.00000000004F9000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000507000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000522000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000055D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000580000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.0000000000638000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1650494052.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_5yTEUojIn0.jbxd
                        Yara matches
                        Similarity
                        • API ID: lstrcpy
                        • String ID:
                        • API String ID: 3722407311-0
                        • Opcode ID: 4ea391a1f9347acba3c00b5a2a9311a386dffa38b9385c59d5aa46518d5842b9
                        • Instruction ID: 77a9aadbbd26ea48150a62d0fa0b2c9b2127a70dadc2ffa25d6a6684b0360a2a
                        • Opcode Fuzzy Hash: 4ea391a1f9347acba3c00b5a2a9311a386dffa38b9385c59d5aa46518d5842b9
                        • Instruction Fuzzy Hash: 291112B46117029BD7149F36D94C927B7F8BF44305704093EA496E3B90DB79E801CB94