Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x4PaiRVIyM.exe

Overview

General Information

Sample name:x4PaiRVIyM.exe
renamed because original name is a hash value
Original sample name:07d746298bccdfde01435ea5968eb08f.exe
Analysis ID:1581193
MD5:07d746298bccdfde01435ea5968eb08f
SHA1:bda240cd0f13f945badb865cf81030220ccfdd5b
SHA256:0b0def4eee7e9831aa4122f2bb81bb5393be6a91ae39e987b1b87853217df3a1
Tags:exeLummaStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality to call native functions
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • x4PaiRVIyM.exe (PID: 7056 cmdline: "C:\Users\user\Desktop\x4PaiRVIyM.exe" MD5: 07D746298BCCDFDE01435EA5968EB08F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["grannyejh.lat", "crosshuaht.lat", "sustainskelet.lat", "breezysmiterz.click", "rapeflowwj.lat", "discokeyus.lat", "energyaffai.lat", "aspecteirs.lat", "necklacebudi.lat"], "Build id": "c2CoW0--breezy"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x4c96f:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T08:17:10.963756+010020283713Unknown Traffic192.168.2.449733172.67.175.134443TCP
      2024-12-27T08:17:13.315259+010020283713Unknown Traffic192.168.2.449734172.67.175.134443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T08:17:12.177678+010020546531A Network Trojan was detected192.168.2.449733172.67.175.134443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-27T08:17:12.177678+010020498361A Network Trojan was detected192.168.2.449733172.67.175.134443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: x4PaiRVIyM.exe.7056.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["grannyejh.lat", "crosshuaht.lat", "sustainskelet.lat", "breezysmiterz.click", "rapeflowwj.lat", "discokeyus.lat", "energyaffai.lat", "aspecteirs.lat", "necklacebudi.lat"], "Build id": "c2CoW0--breezy"}
      Source: x4PaiRVIyM.exeReversingLabs: Detection: 39%
      Source: x4PaiRVIyM.exeVirustotal: Detection: 40%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.3% probability
      Source: x4PaiRVIyM.exeJoe Sandbox ML: detected
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: breezysmiterz.click
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmpString decryptor: c2CoW0--breezy
      Source: x4PaiRVIyM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: unknownHTTPS traffic detected: 172.67.175.134:443 -> 192.168.2.4:49733 version: TLS 1.2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edi, byte ptr [eax+ebx-00E4B818h]0_2_020CF253
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_020CF253
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_020CF253
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov esi, ecx0_2_020D72C5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_020F6332
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov word ptr [eax], cx0_2_020DB357
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [edi], al0_2_020CA3A2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then lea esi, dword ptr [ebx+01h]0_2_020ED073
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov edx, ecx0_2_020E7192
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], D6A985C1h0_2_020DB612
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-64E221E2h]0_2_020DB612
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], E785F9BAh0_2_020DB612
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h0_2_020FC6D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], A2347758h0_2_020FC6D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h0_2_020FC6D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], C72EB52Eh0_2_020FC6D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-6F95659Eh]0_2_020E56E2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ecx, word ptr [ebp+eax+00h]0_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebp-6652ED46h]0_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ecx, edx0_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h0_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov edi, edx0_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [edi+ecx]0_2_020FA7CE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_020DC7C2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov word ptr [eax], cx0_2_020DE49D
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then jmp ecx0_2_020E94E8
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_020EB4E2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax]0_2_020FE4FD
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+6F3BA852h]0_2_020E2A0D
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax+192C4228h]0_2_020CEA5B
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-64E22175h]0_2_020E5A65
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-54988DE3h]0_2_020E6AC2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movsx esi, byte ptr [eax]0_2_020FEB43
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_020ECB9B
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_020ECBF1
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ecx, eax0_2_020E7802
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then jmp ecx0_2_020E9879
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov esi, ecx0_2_020CD8CD
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov word ptr [esi], cx0_2_020E98D9
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx esi, byte ptr [edx+eax-56h]0_2_020E7915
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ecx], dl0_2_020DD93C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx esi, word ptr [edx]0_2_020D9E29
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov word ptr [eax], cx0_2_020D5E42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov edi, esi0_2_020FDEF4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ecx, eax0_2_020DCF02
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_020EBF12
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then jmp dword ptr [004447D8h]0_2_020D8FA0
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], 9B8FCE03h0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 41E6EFBDh0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], E785F9BAh0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], E785F9BAh0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ecx, dword ptr [esp+00000090h]0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov ebx, edx0_2_020FBFB2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+09h]0_2_020CBFF2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_020C8C42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_020C8C42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-7D69D2A9h]0_2_020E9C7F
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_020ECB6B
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_020F9CC2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then test eax, eax0_2_020F9CC2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-0BCF8926h]0_2_020DACFC
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-728FB354h]0_2_02100CE2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 4x nop then cmp al, 5Ch0_2_020C3DA2

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49733 -> 172.67.175.134:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49733 -> 172.67.175.134:443
      Source: Malware configuration extractorURLs: grannyejh.lat
      Source: Malware configuration extractorURLs: crosshuaht.lat
      Source: Malware configuration extractorURLs: sustainskelet.lat
      Source: Malware configuration extractorURLs: breezysmiterz.click
      Source: Malware configuration extractorURLs: rapeflowwj.lat
      Source: Malware configuration extractorURLs: discokeyus.lat
      Source: Malware configuration extractorURLs: energyaffai.lat
      Source: Malware configuration extractorURLs: aspecteirs.lat
      Source: Malware configuration extractorURLs: necklacebudi.lat
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.175.134:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.175.134:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: breezysmiterz.click
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: breezysmiterz.click
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: breezysmiterz.click
      Source: x4PaiRVIyM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: x4PaiRVIyM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.00000000005C9000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.00000000005C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779099482.00000000005EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
      Source: x4PaiRVIyM.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
      Source: x4PaiRVIyM.exeString found in binary or memory: http://ocsp.comodoca.com0
      Source: x4PaiRVIyM.exeString found in binary or memory: http://ocsp.digicert.com0A
      Source: x4PaiRVIyM.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: x4PaiRVIyM.exeString found in binary or memory: http://ocsp.digicert.com0X
      Source: x4PaiRVIyM.exeString found in binary or memory: http://ocsp.sectigo.com0
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.00000000005C9000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.000000000054E000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.00000000005C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/api
      Source: x4PaiRVIyM.exe, 00000000.00000002.1779445053.000000000054E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/apid
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/apii
      Source: x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000564000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/c
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/pi
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://breezysmiterz.click/piV
      Source: x4PaiRVIyM.exeString found in binary or memory: https://sectigo.com/CPS0
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownHTTPS traffic detected: 172.67.175.134:443 -> 192.168.2.4:49733 version: TLS 1.2

      System Summary

      barindex
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_0210E185 NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,CreateThread,0_2_0210E185
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00405C980_2_00405C98
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004058540_2_00405854
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004058B40_2_004058B4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004052700_2_00405270
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004053B40_2_004053B4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_0040840C0_2_0040840C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00404C100_2_00404C10
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00405CE40_2_00405CE4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00404C840_2_00404C84
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_0040457C0_2_0040457C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00404D040_2_00404D04
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00405D2E0_2_00405D2E
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004045CC0_2_004045CC
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004045DC0_2_004045DC
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004045F00_2_004045F0
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004045F40_2_004045F4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00405E850_2_00405E85
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C03C50_2_020C03C5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_0210E1850_2_0210E185
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020EC2020_2_020EC202
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CF2530_2_020CF253
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020EA2720_2_020EA272
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E12B40_2_020E12B4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FA2C20_2_020FA2C2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F92C20_2_020F92C2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E33620_2_020E3362
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_021003920_2_02100392
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C00000_2_020C0000
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DF0520_2_020DF052
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D00F20_2_020D00F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C71720_2_020C7172
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C51720_2_020C5172
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DE1870_2_020DE187
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D21A20_2_020D21A2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E21F20_2_020E21F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DB6120_2_020DB612
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E966C0_2_020E966C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_021006820_2_02100682
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FC6D20_2_020FC6D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E36F20_2_020E36F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C47220_2_020C4722
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CE7DA0_2_020CE7DA
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C64520_2_020C6452
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E74620_2_020E7462
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DE49D0_2_020DE49D
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DF5120_2_020DF512
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020ED5870_2_020ED587
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F35E20_2_020F35E2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CA5F20_2_020CA5F2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DFA120_2_020DFA12
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CAA320_2_020CAA32
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F8A920_2_020F8A92
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E2B120_2_020E2B12
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C5B220_2_020C5B22
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E5B420_2_020E5B42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FEB430_2_020FEB43
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CEB720_2_020CEB72
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020ECB9B0_2_020ECB9B
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E7BA70_2_020E7BA7
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020ECBF10_2_020ECBF1
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F88320_2_020F8832
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C98820_2_020C9882
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DD93C0_2_020DD93C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F79600_2_020F7960
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E19830_2_020E1983
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_021009A20_2_021009A2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020EE9C80_2_020EE9C8
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C79D20_2_020C79D2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D9E290_2_020D9E29
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D5E420_2_020D5E42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020DAE590_2_020DAE59
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C7E620_2_020C7E62
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FDEF40_2_020FDEF4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E4F610_2_020E4F61
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F8FA20_2_020F8FA2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D7FBE0_2_020D7FBE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FBFB20_2_020FBFB2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020EDFEE0_2_020EDFEE
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020CBFF20_2_020CBFF2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C8C420_2_020C8C42
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020E9C7F0_2_020E9C7F
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020ECB6B0_2_020ECB6B
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F9CC20_2_020F9CC2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_02100CE20_2_02100CE2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020D2D0C0_2_020D2D0C
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F1D820_2_020F1D82
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020F7DF20_2_020F7DF2
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: String function: 020D5E32 appears 71 times
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: String function: 020C9692 appears 72 times
      Source: x4PaiRVIyM.exeStatic PE information: invalid certificate
      Source: x4PaiRVIyM.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: x4PaiRVIyM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/1
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C0AD5 CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,CloseHandle,0_2_020C0AD5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: x4PaiRVIyM.exeReversingLabs: Detection: 39%
      Source: x4PaiRVIyM.exeVirustotal: Detection: 40%
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeFile read: C:\Users\user\Desktop\x4PaiRVIyM.exeJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: x4PaiRVIyM.exeStatic file information: File size 4579882 > 1048576
      Source: x4PaiRVIyM.exeStatic PE information: real checksum: 0x1b9b06 should be: 0x460e79
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FC362 push eax; mov dword ptr [esp], A2A3A4A5h0_2_020FC370
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020FF032 push eax; mov dword ptr [esp], 9190AF7Eh0_2_020FF033
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_02102CDD push esi; ret 0_2_02102CE5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeAPI coverage: 9.4 %
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exe TID: 6408Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exe TID: 5516Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
      Source: x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: x4PaiRVIyM.exe, 00000000.00000002.1779445053.000000000056E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C03C5 mov edx, dword ptr fs:[00000030h]0_2_020C03C5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C0985 mov eax, dword ptr fs:[00000030h]0_2_020C0985
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C0FD4 mov eax, dword ptr fs:[00000030h]0_2_020C0FD4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C0FD5 mov eax, dword ptr fs:[00000030h]0_2_020C0FD5
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_020C0D35 mov eax, dword ptr fs:[00000030h]0_2_020C0D35

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: x4PaiRVIyM.exeString found in binary or memory: sustainskelet.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: aspecteirs.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: energyaffai.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: necklacebudi.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: rapeflowwj.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: crosshuaht.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: discokeyus.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: grannyejh.lat
      Source: x4PaiRVIyM.exeString found in binary or memory: breezysmiterz.click
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: GetLocaleInfoA,0_2_0040444A
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeCode function: 0_2_00404482 GetVersionExA,0_2_00404482
      Source: C:\Users\user\Desktop\x4PaiRVIyM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Access Token Manipulation
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive113
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
      Obfuscated Files or Information
      NTDS2
      Process Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets15
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      x4PaiRVIyM.exe39%ReversingLabs
      x4PaiRVIyM.exe40%VirustotalBrowse
      x4PaiRVIyM.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://breezysmiterz.click/apid0%Avira URL Cloudsafe
      https://breezysmiterz.click/api0%Avira URL Cloudsafe
      https://breezysmiterz.click/piV0%Avira URL Cloudsafe
      https://breezysmiterz.click/c0%Avira URL Cloudsafe
      https://breezysmiterz.click/pi0%Avira URL Cloudsafe
      breezysmiterz.click0%Avira URL Cloudsafe
      https://breezysmiterz.click/0%Avira URL Cloudsafe
      https://breezysmiterz.click/apii0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      breezysmiterz.click
      172.67.175.134
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        necklacebudi.latfalse
          high
          breezysmiterz.clicktrue
          • Avira URL Cloud: safe
          unknown
          sustainskelet.latfalse
            high
            crosshuaht.latfalse
              high
              rapeflowwj.latfalse
                high
                https://breezysmiterz.click/apitrue
                • Avira URL Cloud: safe
                unknown
                grannyejh.latfalse
                  high
                  aspecteirs.latfalse
                    high
                    discokeyus.latfalse
                      high
                      energyaffai.latfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://sectigo.com/CPS0x4PaiRVIyM.exefalse
                          high
                          https://breezysmiterz.click/apiix4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.microx4PaiRVIyM.exe, 00000000.00000003.1779099482.00000000005EA000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yx4PaiRVIyM.exefalse
                              high
                              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0x4PaiRVIyM.exefalse
                                high
                                http://ocsp.sectigo.com0x4PaiRVIyM.exefalse
                                  high
                                  https://breezysmiterz.click/piVx4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://breezysmiterz.click/apidx4PaiRVIyM.exe, 00000000.00000002.1779445053.000000000054E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#x4PaiRVIyM.exefalse
                                    high
                                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#x4PaiRVIyM.exefalse
                                      high
                                      https://breezysmiterz.click/x4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://breezysmiterz.click/pix4PaiRVIyM.exe, 00000000.00000003.1779129581.0000000000598000.00000004.00000020.00020000.00000000.sdmp, x4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000598000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://breezysmiterz.click/cx4PaiRVIyM.exe, 00000000.00000002.1779445053.0000000000564000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      172.67.175.134
                                      breezysmiterz.clickUnited States
                                      13335CLOUDFLARENETUStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1581193
                                      Start date and time:2024-12-27 08:16:10 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 2m 29s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:2
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:x4PaiRVIyM.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:07d746298bccdfde01435ea5968eb08f.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@1/0@1/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 10
                                      • Number of non-executed functions: 132
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Stop behavior analysis, all processes terminated
                                      • Exclude process from analysis (whitelisted): SIHClient.exe
                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      02:17:11API Interceptor2x Sleep call for process: x4PaiRVIyM.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      172.67.175.134PO# 0499699.exeGet hashmaliciousFormBookBrowse
                                      • www.yihetubu.com/u6e4/?l0DL=bT6Hn4EpFnWH&U6ApY=IHGRx2D03MO2Li40IzUvs7zF3B/N+nlQ0tWfuVZKRE1k94k9L8v4sWIwR5z1KUInAjtt
                                      RE; KOC RFQ for Flangers - RFQ 22965431.exeGet hashmaliciousFormBookBrowse
                                      • www.yihetubu.com/u6e4/?t4qdXV=IHGRx2D03MO2Li40IzUvs7zF3B/N+nlQ0tWfuVZKRE1k94k9L8v4sWIwR5z1KUInAjtt&irj=3fI8l
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUS3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.62.151
                                      installer.batGet hashmaliciousVidarBrowse
                                      • 172.64.41.3
                                      skript.batGet hashmaliciousVidarBrowse
                                      • 162.159.61.3
                                      din.exeGet hashmaliciousVidarBrowse
                                      • 172.64.41.3
                                      lem.exeGet hashmaliciousVidarBrowse
                                      • 172.64.41.3
                                      markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                      • 104.26.13.205
                                      utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                      • 172.67.74.152
                                      0Gs0WEGB1E.dllGet hashmaliciousUnknownBrowse
                                      • 104.21.22.88
                                      Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.80.1
                                      NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.190.223
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      a0e9f5d64349fb13191bc781f81f42e13vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      setup.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                      • 172.67.175.134
                                      installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                      • 172.67.175.134
                                      0zBsv1tnt4.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      cqHMm0ykDG.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      pVbAZEFIpI.exeGet hashmaliciousLummaCBrowse
                                      • 172.67.175.134
                                      No context
                                      No created / dropped files found
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.994551971610554
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.94%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:x4PaiRVIyM.exe
                                      File size:4'579'882 bytes
                                      MD5:07d746298bccdfde01435ea5968eb08f
                                      SHA1:bda240cd0f13f945badb865cf81030220ccfdd5b
                                      SHA256:0b0def4eee7e9831aa4122f2bb81bb5393be6a91ae39e987b1b87853217df3a1
                                      SHA512:5af308a2f64b7854405b069dc39ca139f270dbbbb46ecf4ac3b6168ed8fad634eb0afdd84ed72b396aba38c68e377028acbbb852b2e67df69b73f3c3478b686f
                                      SSDEEP:98304:p3CAJ6KOJEq5zh/a84KlgJnE7x2KOJEq5zh/a84KlgJnE7h:t16ZJx5zhFynE7cZJx5zhFynE7h
                                      TLSH:912633667514CBBBF6E7C032DE4665C19CD3BC4A50909D8E98B8CDF11EAFA8F204B590
                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                      Icon Hash:2f232d67b7934633
                                      Entrypoint:0x409c40
                                      Entrypoint Section:CODE
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:1
                                      OS Version Minor:0
                                      File Version Major:1
                                      File Version Minor:0
                                      Subsystem Version Major:1
                                      Subsystem Version Minor:0
                                      Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                      Signature Valid:false
                                      Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                      Signature Validation Error:The digital signature of the object did not verify
                                      Error Number:-2146869232
                                      Not Before, Not After
                                      • 12/12/2023 19:00:00 12/12/2024 18:59:59
                                      Subject Chain
                                      • CN=FH Manager, O=FH Manager, S=Tel Aviv, C=IL
                                      Version:3
                                      Thumbprint MD5:FC7AFEABF8E3E561F165BA065EFB55B1
                                      Thumbprint SHA-1:DDF30E830B0F5EA422E6EF4FA1EDB76C4DDA1841
                                      Thumbprint SHA-256:E1223427BF9091509CDE343DA265D51A941B05285F29CD3CC55794A8E3CB3E8F
                                      Serial:0CDF20599C834E3EF537BAE3E63896BB
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      add esp, FFFFFFC4h
                                      push ebx
                                      push esi
                                      push edi
                                      xor eax, eax
                                      mov dword ptr [ebp-10h], eax
                                      mov dword ptr [ebp-24h], eax
                                      call 00007FB07C6AB4BBh
                                      call 00007FB07C6AC6C2h
                                      call 00007FB07C6AC951h
                                      call 00007FB07C6AE988h
                                      call 00007FB07C6AE9CFh
                                      call 00007FB07C6B12FEh
                                      call 00007FB07C6B1465h
                                      xor eax, eax
                                      push ebp
                                      push 0040A2FCh
                                      push dword ptr fs:[eax]
                                      mov dword ptr fs:[eax], esp
                                      xor edx, edx
                                      push ebp
                                      push 0040A2C5h
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      mov eax, dword ptr [0040C014h]
                                      call 00007FB07C6B1ECBh
                                      call 00007FB07C6B1AFEh
                                      lea edx, dword ptr [ebp-10h]
                                      xor eax, eax
                                      call 00007FB07C6AEFB8h
                                      mov edx, dword ptr [ebp-10h]
                                      mov eax, 0040CDE8h
                                      call 00007FB07C6AB567h
                                      push 00000002h
                                      push 00000000h
                                      push 00000001h
                                      mov ecx, dword ptr [0040CDE8h]
                                      mov dl, 01h
                                      mov eax, 0040738Ch
                                      call 00007FB07C6AF847h
                                      mov dword ptr [0040CDECh], eax
                                      xor edx, edx
                                      push ebp
                                      push 0040A27Dh
                                      push dword ptr fs:[edx]
                                      mov dword ptr fs:[edx], esp
                                      call 00007FB07C6B1F3Bh
                                      mov dword ptr [0040CDF4h], eax
                                      mov eax, dword ptr [0040CDF4h]
                                      cmp dword ptr [eax+0Ch], 01h
                                      jne 00007FB07C6B207Ah
                                      mov eax, dword ptr [0040CDF4h]
                                      mov edx, 00000028h
                                      call 00007FB07C6AFC48h
                                      mov edx, dword ptr [000000F4h]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x53800.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x45b68a0x2ba0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x100000x0.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      CODE0x10000x93640x94003026e4057f603ea3534baf308dc2bdabFalse0.6630331503378378data6.777247155569041IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      DATA0xb0000x24c0x400e8f82382eefca31b62f6a8c8a52ff421False0.3154296875data2.753482278202086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      BSS0xc0000xe4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      .rsrc0x110000x538000x5380033e007cb407801c57ade66900a64afb8False0.6627263052020959data7.59851779558257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x113b40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colorsEnglishUnited States0.6317567567567568
                                      RT_ICON0x114dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.5823699421965318
                                      RT_ICON0x11a440x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colorsEnglishUnited States0.5120967741935484
                                      RT_ICON0x11d2c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.5509927797833934
                                      RT_ICON0x125d40x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.36341463414634145
                                      RT_ICON0x12c3c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.42350746268656714
                                      RT_STRING0x13ae40x2f2data0.35543766578249336
                                      RT_STRING0x13dd80x30cdata0.3871794871794872
                                      RT_STRING0x140e40x2cedata0.42618384401114207
                                      RT_STRING0x143b40x68data0.75
                                      RT_STRING0x1441c0xb4data0.6277777777777778
                                      RT_STRING0x144d00xaedata0.5344827586206896
                                      RT_RCDATA0x145800x2cdata1.1818181818181819
                                      RT_GROUP_ICON0x145ac0x5adataEnglishUnited States0.7333333333333333
                                      RT_VERSION0x146080x4b8COM executable for DOSEnglishUnited States0.30629139072847683
                                      RT_MANIFEST0x14ac00x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                      DLLImport
                                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                      user32.dllMessageBoxA
                                      oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                      kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                      user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                      comctl32.dllInitCommonControls
                                      advapi32.dllAdjustTokenPrivileges
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-27T08:17:10.963756+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.175.134443TCP
                                      2024-12-27T08:17:12.177678+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449733172.67.175.134443TCP
                                      2024-12-27T08:17:12.177678+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449733172.67.175.134443TCP
                                      2024-12-27T08:17:13.315259+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.175.134443TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 27, 2024 08:17:09.738843918 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:09.738899946 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:09.738993883 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:09.742043018 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:09.742059946 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:10.963681936 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:10.963756084 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:10.971724987 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:10.971767902 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:10.972001076 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:11.018225908 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:11.133136988 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:11.133169889 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:11.133280039 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:12.177686930 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:12.177774906 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:12.177855015 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:12.200318098 CET49733443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:12.200346947 CET44349733172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:12.211139917 CET49734443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:12.211184025 CET44349734172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:12.211256027 CET49734443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:12.212584019 CET49734443192.168.2.4172.67.175.134
                                      Dec 27, 2024 08:17:12.212595940 CET44349734172.67.175.134192.168.2.4
                                      Dec 27, 2024 08:17:13.315258980 CET49734443192.168.2.4172.67.175.134
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 27, 2024 08:17:09.361124992 CET5726153192.168.2.41.1.1.1
                                      Dec 27, 2024 08:17:09.732237101 CET53572611.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 27, 2024 08:17:09.361124992 CET192.168.2.41.1.1.10x2fd3Standard query (0)breezysmiterz.clickA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 27, 2024 08:17:09.732237101 CET1.1.1.1192.168.2.40x2fd3No error (0)breezysmiterz.click172.67.175.134A (IP address)IN (0x0001)false
                                      Dec 27, 2024 08:17:09.732237101 CET1.1.1.1192.168.2.40x2fd3No error (0)breezysmiterz.click104.21.96.86A (IP address)IN (0x0001)false
                                      • breezysmiterz.click
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449733172.67.175.1344437056C:\Users\user\Desktop\x4PaiRVIyM.exe
                                      TimestampBytes transferredDirectionData
                                      2024-12-27 07:17:11 UTC266OUTPOST /api HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                      Content-Length: 8
                                      Host: breezysmiterz.click
                                      2024-12-27 07:17:11 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                      Data Ascii: act=life
                                      2024-12-27 07:17:12 UTC1136INHTTP/1.1 200 OK
                                      Date: Fri, 27 Dec 2024 07:17:12 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Set-Cookie: PHPSESSID=2k9bkc45ukockg0otu82jo1v12; expires=Tue, 22 Apr 2025 01:03:50 GMT; Max-Age=9999999; path=/
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      X-Frame-Options: DENY
                                      X-Content-Type-Options: nosniff
                                      X-XSS-Protection: 1; mode=block
                                      cf-cache-status: DYNAMIC
                                      vary: accept-encoding
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rUkdHoO%2FwYArajtiuS%2B%2F4BqcmqZS5GEWwS0N%2FNdw8jQVJNJR9U9CfPHst%2FYayQq8wFXpLm%2B%2FkimEsZaRKz7XPYiHV08jdWFrkBxu1RIdHB77Gdjf3hLvFj5egLhojlg8pNC1rL%2B9"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8f87878999584362-EWR
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2411&min_rtt=2400&rtt_var=922&sent=7&recv=8&lost=0&retrans=0&sent_bytes=2851&recv_bytes=910&delivery_rate=1172219&cwnd=250&unsent_bytes=0&cid=7a529f8cafaaf456&ts=1227&x=0"
                                      2024-12-27 07:17:12 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                      Data Ascii: 2ok
                                      2024-12-27 07:17:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Click to jump to process

                                      Click to jump to process

                                      Target ID:0
                                      Start time:02:17:02
                                      Start date:27/12/2024
                                      Path:C:\Users\user\Desktop\x4PaiRVIyM.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\x4PaiRVIyM.exe"
                                      Imagebase:0x400000
                                      File size:4'579'882 bytes
                                      MD5 hash:07D746298BCCDFDE01435EA5968EB08F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:1.4%
                                        Dynamic/Decrypted Code Coverage:69.2%
                                        Signature Coverage:21.9%
                                        Total number of Nodes:169
                                        Total number of Limit Nodes:11
                                        execution_graph 19043 409c40 19083 4030dc 19043->19083 19045 409c56 19080 4042e8 19045->19080 19047 409c5b 19048 40457c GetModuleHandleA GetProcAddress GetProcAddress 19047->19048 19049 409c60 19048->19049 19050 4065b8 GetProcAddress GetProcAddress VirtualAlloc VirtualAlloc 19049->19050 19051 409c65 19050->19051 19052 406604 6F551CD0 19051->19052 19053 409c6a 19052->19053 19054 4090a4 11 API calls 19053->19054 19055 409c74 19054->19055 19056 409b30 GetSystemInfo VirtualQuery VirtualProtect VirtualProtect VirtualQuery 19055->19056 19057 409c9a 19056->19057 19058 409768 7 API calls 19057->19058 19059 409c9f 19058->19059 19060 406c2c 6 API calls 19059->19060 19061 409ca9 19060->19061 19062 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 19061->19062 19063 409cb6 19062->19063 19064 4074e0 6 API calls 19063->19064 19065 409cce 19064->19065 19066 409bec FindResourceA SizeofResource LoadResource LockResource 19065->19066 19067 409ce6 19066->19067 19068 407918 InterlockedExchange 19067->19068 19069 409d05 19067->19069 19068->19069 19070 4074a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue FormatMessageA 19069->19070 19071 409d69 19070->19071 19072 407a28 InterlockedExchange 19071->19072 19073 409da9 19072->19073 19074 408b08 6 API calls 19073->19074 19075 409dd4 19074->19075 19076 404c10 LoadLibraryA 19075->19076 19077 409def 19076->19077 19078 408b08 6 API calls 19077->19078 19079 409e28 19077->19079 19078->19077 19082 404323 19080->19082 19086 403154 19080->19086 19099 403094 19083->19099 19085 4030e1 GetModuleHandleA GetCommandLineA 19085->19045 19087 403164 19086->19087 19088 40318c TlsGetValue 19086->19088 19087->19082 19089 403196 19088->19089 19090 40316f 19088->19090 19089->19082 19094 40310c 19090->19094 19092 403174 TlsGetValue 19093 403184 19092->19093 19093->19082 19095 403120 LocalAlloc 19094->19095 19096 403116 19094->19096 19097 40313e TlsSetValue 19095->19097 19098 403132 19095->19098 19096->19095 19097->19098 19098->19092 19099->19085 19100 20c03c5 19101 20c03d3 19100->19101 19116 20c0d15 19101->19116 19103 20c095e 19104 20c056b GetPEB 19106 20c05e8 19104->19106 19105 20c0526 19105->19103 19105->19104 19119 20c0ad5 19106->19119 19109 20c0649 CreateThread 19110 20c0621 19109->19110 19131 20c0985 GetPEB 19109->19131 19111 20c0859 19110->19111 19127 20c0fd5 GetPEB 19110->19127 19113 20c0949 TerminateProcess 19111->19113 19113->19103 19114 20c0ad5 4 API calls 19114->19111 19117 20c0d22 19116->19117 19129 20c0d35 GetPEB 19116->19129 19117->19105 19120 20c0aeb CreateToolhelp32Snapshot 19119->19120 19122 20c061b 19120->19122 19123 20c0b22 Thread32First 19120->19123 19122->19109 19122->19110 19123->19122 19124 20c0b49 19123->19124 19124->19122 19125 20c0b80 Wow64SuspendThread 19124->19125 19126 20c0baa CloseHandle 19124->19126 19125->19126 19126->19124 19128 20c06a3 19127->19128 19128->19111 19128->19114 19130 20c0d50 19129->19130 19130->19117 19134 20c09de 19131->19134 19132 20c0a3e CreateThread 19132->19134 19135 20c11b5 19132->19135 19133 20c0a8b 19134->19132 19134->19133 19138 210c77a 19135->19138 19139 210c889 19138->19139 19140 210c79f 19138->19140 19150 210da55 19139->19150 19174 210effc 19140->19174 19143 210c7b7 19144 210effc LoadLibraryA 19143->19144 19149 20c11ba 19143->19149 19145 210c7f9 19144->19145 19146 210effc LoadLibraryA 19145->19146 19147 210c815 19146->19147 19148 210effc LoadLibraryA 19147->19148 19148->19149 19151 210effc LoadLibraryA 19150->19151 19152 210da78 19151->19152 19153 210effc LoadLibraryA 19152->19153 19154 210da90 19153->19154 19155 210effc LoadLibraryA 19154->19155 19156 210daae 19155->19156 19157 210dac3 VirtualAlloc 19156->19157 19166 210dad7 19156->19166 19159 210daf1 19157->19159 19157->19166 19158 210effc LoadLibraryA 19160 210db6f 19158->19160 19159->19158 19172 210dd4a 19159->19172 19164 210dbc5 19160->19164 19160->19166 19178 210ee03 19160->19178 19161 210effc LoadLibraryA 19161->19164 19163 210dc27 19163->19172 19173 210dc89 19163->19173 19206 210cbe5 19163->19206 19164->19161 19164->19163 19164->19172 19165 210de08 VirtualFree 19165->19166 19166->19149 19168 210dc72 19168->19172 19213 210cce0 19168->19213 19171 210dda7 19171->19171 19172->19165 19172->19171 19173->19172 19182 210e185 19173->19182 19175 210f013 19174->19175 19176 210f03a 19175->19176 19232 210d101 19175->19232 19176->19143 19180 210ee18 19178->19180 19179 210ee8e LoadLibraryA 19181 210ee98 19179->19181 19180->19179 19180->19181 19181->19160 19183 210e1c0 19182->19183 19184 210e207 NtCreateSection 19183->19184 19185 210e22c 19183->19185 19205 210e834 19183->19205 19184->19185 19184->19205 19186 210e2c1 NtMapViewOfSection 19185->19186 19185->19205 19187 210e2e1 19186->19187 19189 210ee03 LoadLibraryA 19187->19189 19194 210e568 19187->19194 19195 210eea1 LoadLibraryA 19187->19195 19187->19205 19188 210e60a VirtualAlloc 19196 210e64c 19188->19196 19189->19187 19190 210ee03 LoadLibraryA 19190->19194 19191 210e6fd VirtualProtect 19192 210e7c8 VirtualProtect 19191->19192 19199 210e71d 19191->19199 19200 210e7f7 19192->19200 19193 210e606 19193->19188 19194->19188 19194->19190 19194->19193 19218 210eea1 19194->19218 19195->19187 19196->19191 19202 210e6ea NtMapViewOfSection 19196->19202 19196->19205 19197 210e942 19201 210e94a CreateThread 19197->19201 19197->19205 19199->19192 19204 210e7a2 VirtualProtect 19199->19204 19200->19197 19200->19205 19222 210ebb6 19200->19222 19201->19205 19202->19191 19202->19205 19204->19199 19205->19172 19207 210ee03 LoadLibraryA 19206->19207 19208 210cbf9 19207->19208 19209 210eea1 LoadLibraryA 19208->19209 19212 210cc01 19208->19212 19210 210cc19 19209->19210 19211 210eea1 LoadLibraryA 19210->19211 19210->19212 19211->19212 19212->19168 19214 210ee03 LoadLibraryA 19213->19214 19215 210ccf6 19214->19215 19216 210eea1 LoadLibraryA 19215->19216 19217 210cd06 19216->19217 19217->19173 19219 210eebc 19218->19219 19221 210efd2 19218->19221 19219->19221 19226 210d2a6 19219->19226 19221->19194 19225 210ebde 19222->19225 19223 210edd0 19223->19197 19224 210eea1 LoadLibraryA 19224->19225 19225->19223 19225->19224 19227 210d2c5 19226->19227 19228 210d2eb 19226->19228 19227->19228 19230 210d2f8 19227->19230 19231 210eea1 LoadLibraryA 19227->19231 19229 210ee03 LoadLibraryA 19228->19229 19228->19230 19229->19230 19230->19221 19231->19227 19233 210d206 19232->19233 19234 210d121 19232->19234 19233->19175 19234->19233 19235 210d2a6 LoadLibraryA 19234->19235 19235->19233
                                        APIs
                                        • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000,00000000), ref: 0210E21E
                                        • NtMapViewOfSection.NTDLL(?,00000000), ref: 0210E2C6
                                        • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0210E63A
                                        • NtMapViewOfSection.NTDLL(?,00000000,?,?,?,?,?,?), ref: 0210E6EF
                                        • VirtualProtect.KERNELBASE(?,?,00000008,?,?,?,?,?,?,?), ref: 0210E70C
                                        • VirtualProtect.KERNELBASE(?,?,?,00000000), ref: 0210E7AF
                                        • VirtualProtect.KERNELBASE(?,?,00000002,?,?,?,?,?,?,?), ref: 0210E7E2
                                        • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0210E953
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Virtual$ProtectSection$CreateView$AllocThread
                                        • String ID:
                                        • API String ID: 1248616170-0
                                        • Opcode ID: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                        • Instruction ID: 119840db42a6952603409888da444018096b3eed513ee6bff015725fe81999c8
                                        • Opcode Fuzzy Hash: ff471fed8362e1f6680916959444b0539dd2ef4160a15e649cb06b76fd5f0269
                                        • Instruction Fuzzy Hash: 78426B71A483019FDB24CF65C884B6ABBE9FF88714F14492DF995DB291E7B0E840CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 187 20c0ad5-20c0b1c CreateToolhelp32Snapshot 190 20c0bf2-20c0bf5 187->190 191 20c0b22-20c0b43 Thread32First 187->191 192 20c0bde-20c0bed 191->192 193 20c0b49-20c0b4f 191->193 192->190 194 20c0bbe-20c0bd8 193->194 195 20c0b51-20c0b57 193->195 194->192 194->193 195->194 196 20c0b59-20c0b78 195->196 196->194 199 20c0b7a-20c0b7e 196->199 200 20c0b96-20c0ba5 199->200 201 20c0b80-20c0b94 Wow64SuspendThread 199->201 202 20c0baa-20c0bbc CloseHandle 200->202 201->202 202->194
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,020C061B,?,00000001,?,81EC8B55,000000FF), ref: 020C0B13
                                        • Thread32First.KERNEL32(00000000,0000001C), ref: 020C0B3F
                                        • Wow64SuspendThread.KERNEL32(00000000), ref: 020C0B92
                                        • CloseHandle.KERNELBASE(00000000), ref: 020C0BBC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseCreateFirstHandleSnapshotSuspendThreadThread32Toolhelp32Wow64
                                        • String ID:
                                        • API String ID: 1849706056-0
                                        • Opcode ID: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                        • Instruction ID: c6ab32a7dbc24870730aa2bb219f88dedb83ff304f76809a0ab57ac096fe8b41
                                        • Opcode Fuzzy Hash: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                        • Instruction Fuzzy Hash: 5641F0B5600209EFDB18DF98C490BADB7F6EF88304F20816CE6159B794DB34AE45CB54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 203 20c03c5-20c052d call 20c0975 call 20c0f75 call 20c1125 call 20c0d15 212 20c095e-20c0961 203->212 213 20c0533-20c053a 203->213 214 20c0545-20c0549 213->214 215 20c056b-20c05e6 GetPEB 214->215 216 20c054b-20c0569 call 20c0e95 214->216 218 20c05f1-20c05f5 215->218 216->214 219 20c060d-20c061f call 20c0ad5 218->219 220 20c05f7-20c060b 218->220 226 20c0649-20c066a CreateThread 219->226 227 20c0621-20c0647 219->227 220->218 228 20c066d-20c0671 226->228 227->228 230 20c0677-20c06aa call 20c0fd5 228->230 231 20c0932-20c095c TerminateProcess 228->231 230->231 235 20c06b0-20c06ff 230->235 231->212 237 20c070a-20c0710 235->237 238 20c0758-20c075c 237->238 239 20c0712-20c0718 237->239 242 20c082a-20c091d call 20c0ad5 call 20c0975 call 20c0f75 238->242 243 20c0762-20c076f 238->243 240 20c071a-20c0729 239->240 241 20c072b-20c072f 239->241 240->241 244 20c0756 241->244 245 20c0731-20c073f 241->245 269 20c091f 242->269 270 20c0922-20c092c 242->270 246 20c077a-20c0780 243->246 244->237 245->244 247 20c0741-20c0753 245->247 250 20c07b0-20c07b3 246->250 251 20c0782-20c0790 246->251 247->244 252 20c07b6-20c07bd 250->252 254 20c07ae 251->254 255 20c0792-20c07a1 251->255 252->242 256 20c07bf-20c07c8 252->256 254->246 255->254 258 20c07a3-20c07ac 255->258 256->242 260 20c07ca-20c07da 256->260 258->250 262 20c07e5-20c07f1 260->262 264 20c0822-20c0828 262->264 265 20c07f3-20c0820 262->265 264->252 265->262 269->270 270->231
                                        APIs
                                        • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000,?,00000001,?,81EC8B55,000000FF), ref: 020C0668
                                        • TerminateProcess.KERNELBASE(000000FF,00000000), ref: 020C095C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateProcessTerminateThread
                                        • String ID: bEc
                                        • API String ID: 1197810419-968463770
                                        • Opcode ID: 719212472fccb540c1fe55a7f8193a09798d8298f831598ce111912240aa4881
                                        • Instruction ID: 5bb67474fd347afd7a2e093d8f3a1dac4d6f24e82fb2ff1ef5b4d6184c930a63
                                        • Opcode Fuzzy Hash: 719212472fccb540c1fe55a7f8193a09798d8298f831598ce111912240aa4881
                                        • Instruction Fuzzy Hash: 7212C2B4E00219DBDB18CF98C990BEDBBB2FF88304F2482A9D515AB395C7356A41DF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 271 20c0985-20c09dc GetPEB 272 20c09e7-20c09eb 271->272 273 20c0a8b-20c0a92 272->273 274 20c09f1-20c09fc 272->274 277 20c0a9d-20c0aa1 273->277 275 20c0a86 274->275 276 20c0a02-20c0a19 274->276 275->272 280 20c0a3e-20c0a56 CreateThread 276->280 281 20c0a1b-20c0a3c 276->281 278 20c0ab2-20c0ab9 277->278 279 20c0aa3-20c0ab0 277->279 284 20c0abb-20c0abd 278->284 285 20c0ac2-20c0ac7 278->285 279->277 286 20c0a5a-20c0a62 280->286 281->286 284->285 286->275 288 20c0a64-20c0a81 286->288 288->275
                                        APIs
                                        • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000), ref: 020C0A51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID: ,
                                        • API String ID: 2422867632-3772416878
                                        • Opcode ID: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                        • Instruction ID: 076a7aff21b1bb303ec2bfb06b0bd319d03a4d8750f1237a5f04085f77df635b
                                        • Opcode Fuzzy Hash: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                        • Instruction Fuzzy Hash: B841A574A00209EFDB14CF98C994BAEB7B2FF88314F208298D5156B391D775AE81DF94

                                        Control-flow Graph

                                        APIs
                                        • VirtualAlloc.KERNELBASE(-D4B31820), ref: 00405CFC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: d63ec981ddf0e84e7a14cf07a3c6889465179f5b58db28bdd862ba16f9a23b19
                                        • Instruction ID: b0b0e27e66d21fcfb25559d8c728905a25e9dc23e86186155415f21b9c884410
                                        • Opcode Fuzzy Hash: d63ec981ddf0e84e7a14cf07a3c6889465179f5b58db28bdd862ba16f9a23b19
                                        • Instruction Fuzzy Hash: 8D810937D542158FD308EF7AEE4662A77A1EB80304B46813FD942B71A6CF3818128BCD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 495 405c98-405d07 VirtualAlloc 496 405d0e-40600f call 40609b call 4078c0 call 40609b call 402490 call 40609b call 402f74 call 40609b call 4015c3 call 4067b5 call 401d7d call 40619f call 40609b * 2 call 402aec call 408080 call 402ba1 call 401584 call 4033fe call 406926 call 402df9 495->496 497 405d09 call 402e31 495->497 538 406020-406029 496->538 539 406011-406016 496->539 497->496 540 406032-406037 call 4060c3 538->540 542 40602b-40602f 538->542 539->540 541 406018-40601e 539->541 545 406085-406097 call 405d2e 540->545 546 406039-40604a call 4060fe 540->546 541->540 542->540 551 4060ba-4060c0 545->551 552 406056-40606c call 4062ca 546->552 553 40604c-406051 546->553 552->545 556 40606e-406072 552->556 553->552 556->545 557 406074-406077 556->557 558 406099-40609d 557->558 559 406079-40607d 557->559 561 4060b5 558->561 562 40609f-4060a9 call 4060c3 558->562 559->558 560 40607f-406083 559->560 560->545 560->558 561->551 563 4060b5 call 4061a9 561->563 562->545 566 4060ab-4060ae 562->566 563->551 566->561 567 4060b0 call 4060fe 566->567 567->561
                                        APIs
                                        • VirtualAlloc.KERNELBASE(-D4B31820), ref: 00405CFC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 97fa9f1b1b9c828e9519fbd967cec5093fb018c9c2c65a5493433bcf01a2eb3b
                                        • Instruction ID: f25ad1aa39492dbe1593cddfc6dfd3ee84072fd57dbd934abab414e45cc3be81
                                        • Opcode Fuzzy Hash: 97fa9f1b1b9c828e9519fbd967cec5093fb018c9c2c65a5493433bcf01a2eb3b
                                        • Instruction Fuzzy Hash: 9081D4379147218BD348EF7AEE5A52A37A1EB80314742853FE942B71B6DF3419428BCD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 569 405d2e-405d4a 570 405d52-405ef2 call 40609b call 402490 call 40609b call 402f74 call 40609b call 4015c3 call 4067b5 call 401d7d call 40619f call 40609b * 2 call 402aec call 408080 call 402ba1 call 401584 569->570 571 405d4d call 4078c0 569->571 601 405ef7-405f8f call 4033fe 570->601 571->570 603 405f94-40600f call 406926 call 402df9 601->603 608 406020-406029 603->608 609 406011-406016 603->609 610 406032-406037 call 4060c3 608->610 612 40602b-40602f 608->612 609->610 611 406018-40601e 609->611 615 406085-406097 call 405d2e 610->615 616 406039-40604a call 4060fe 610->616 611->610 612->610 621 4060ba-4060c0 615->621 622 406056-40606c call 4062ca 616->622 623 40604c-406051 616->623 622->615 626 40606e-406072 622->626 623->622 626->615 627 406074-406077 626->627 628 406099-40609d 627->628 629 406079-40607d 627->629 631 4060b5 628->631 632 40609f-4060a9 call 4060c3 628->632 629->628 630 40607f-406083 629->630 630->615 630->628 631->621 633 4060b5 call 4061a9 631->633 632->615 636 4060ab-4060ae 632->636 633->621 636->631 637 4060b0 call 4060fe 636->637 637->631
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b025d90ad5e191edba6dafdaadfe17ce75940a4f70bfee07e7b979ba69129a83
                                        • Instruction ID: 9296528e241a03051ff9cd15e0cdb9a460f3580ec1f86699581b55d45115f1c1
                                        • Opcode Fuzzy Hash: b025d90ad5e191edba6dafdaadfe17ce75940a4f70bfee07e7b979ba69129a83
                                        • Instruction Fuzzy Hash: FB81F736D502158BD708EF7AEE4662A7761EB90314B46813FD943B72A6DB3818128BCD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 639 405e85-405e96 640 405e9e-405f8f call 401584 call 4033fe 639->640 641 405e99 call 402ba1 639->641 645 405f94-40600f call 406926 call 402df9 640->645 641->640 650 406020-406029 645->650 651 406011-406016 645->651 652 406032-406037 call 4060c3 650->652 654 40602b-40602f 650->654 651->652 653 406018-40601e 651->653 657 406085-406097 call 405d2e 652->657 658 406039-40604a call 4060fe 652->658 653->652 654->652 663 4060ba-4060c0 657->663 664 406056-40606c call 4062ca 658->664 665 40604c-406051 658->665 664->657 668 40606e-406072 664->668 665->664 668->657 669 406074-406077 668->669 670 406099-40609d 669->670 671 406079-40607d 669->671 673 4060b5 670->673 674 40609f-4060a9 call 4060c3 670->674 671->670 672 40607f-406083 671->672 672->657 672->670 673->663 675 4060b5 call 4061a9 673->675 674->657 678 4060ab-4060ae 674->678 675->663 678->673 679 4060b0 call 4060fe 678->679 679->673
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 04421779516b2b6d238e9f50d530aa0607eafb0cbe23f7bff16d6bc2bf409b67
                                        • Instruction ID: 40a9f992c9fde089e4e3ff3208fb41036a66ec80b815512836150be068606bfa
                                        • Opcode Fuzzy Hash: 04421779516b2b6d238e9f50d530aa0607eafb0cbe23f7bff16d6bc2bf409b67
                                        • Instruction Fuzzy Hash: 4C51E4369402158FD714EFBAEE4A66677A5EB44304F06813FD542BB2E6CB7818118BCD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 290 210ee03-210ee16 291 210ee18-210ee1b 290->291 292 210ee2e-210ee38 290->292 293 210ee1d-210ee20 291->293 294 210ee47-210ee53 292->294 295 210ee3a-210ee42 292->295 293->292 296 210ee22-210ee2c 293->296 297 210ee56-210ee5b 294->297 295->294 296->292 296->293 298 210ee5d-210ee68 297->298 299 210ee8e-210ee95 LoadLibraryA 297->299 300 210ee84-210ee88 298->300 301 210ee6a-210ee82 call 210f4d1 298->301 302 210ee98-210ee9c 299->302 300->297 304 210ee8a-210ee8c 300->304 301->300 306 210ee9d-210ee9f 301->306 304->299 304->302 306->302
                                        APIs
                                        • LoadLibraryA.KERNELBASE(00000000,?,?), ref: 0210EE95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: .dll
                                        • API String ID: 1029625771-2738580789
                                        • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                        • Instruction ID: 0d4227463b9d776e4c5c37b8670d5b188c1b33cc394d15de378ae0bca7d58b12
                                        • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                        • Instruction Fuzzy Hash: B1212C366002998FEB25CF6DC8C4B697BE4EF01324F28446DD805CBA91D7B0E845CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 307 210da55-210dab9 call 210effc * 3 314 210dae3 307->314 315 210dabb-210dabd 307->315 317 210dae6-210daf0 314->317 315->314 316 210dabf-210dac1 315->316 316->314 318 210dac3-210dad5 VirtualAlloc 316->318 319 210daf1-210db14 call 210f471 call 210f495 318->319 320 210dad7-210dade 318->320 326 210db16-210db4c call 210f169 call 210f03f 319->326 327 210db5e-210db77 call 210effc 319->327 320->314 321 210dae0 320->321 321->314 336 210db52-210db58 326->336 337 210ddad-210ddb6 326->337 327->314 333 210db7d 327->333 335 210db83-210db89 333->335 338 210dbc5-210dbce 335->338 339 210db8b-210db91 335->339 336->327 336->337 342 210ddb8-210ddbb 337->342 343 210ddbd-210ddc5 337->343 340 210dbd0-210dbd6 338->340 341 210dc27-210dc32 338->341 344 210db93-210db96 339->344 345 210dbda-210dbf5 call 210effc 340->345 348 210dc34-210dc3d call 210cd49 341->348 349 210dc4b-210dc4e 341->349 342->343 346 210ddf4 342->346 343->346 347 210ddc7-210ddf2 call 210f495 343->347 350 210db98-210db9d 344->350 351 210dbaa-210dbac 344->351 372 210dc14-210dc25 345->372 373 210dbf7-210dbff 345->373 357 210ddf8-210de18 call 210f495 VirtualFree 346->357 347->357 354 210dda9 348->354 368 210dc43-210dc49 348->368 353 210dc54-210dc5d 349->353 349->354 350->351 359 210db9f-210dba8 350->359 351->338 352 210dbae-210dbbc call 210ee03 351->352 369 210dbc1-210dbc3 352->369 361 210dc63-210dc6a 353->361 362 210dc5f 353->362 354->337 374 210de1a 357->374 375 210de1e-210de20 357->375 359->344 359->351 370 210dc9a-210dc9e 361->370 371 210dc6c-210dc75 call 210cbe5 361->371 362->361 368->361 369->335 379 210dd40-210dd43 370->379 380 210dca4-210dcc6 370->380 386 210dc83-210dc8c call 210cce0 371->386 387 210dc77-210dc7d 371->387 372->341 372->345 373->354 377 210dc05-210dc0e 373->377 374->375 375->317 377->354 377->372 382 210dd95-210dd97 call 210e185 379->382 383 210dd45-210dd48 379->383 380->354 392 210dccc-210dcdf call 210f471 380->392 391 210dd9c-210dd9d 382->391 383->382 388 210dd4a-210dd4d 383->388 386->370 404 210dc8e-210dc94 386->404 387->354 387->386 389 210dd66-210dd77 call 210d846 388->389 390 210dd4f-210dd51 388->390 408 210dd88-210dd93 call 210d312 389->408 409 210dd79-210dd85 call 210de25 389->409 390->389 394 210dd53-210dd56 390->394 395 210dd9e-210dda5 391->395 406 210dce1-210dce5 392->406 407 210dd03-210dd3c 392->407 399 210dd58-210dd5b 394->399 400 210dd5d-210dd64 call 210e9f3 394->400 395->354 401 210dda7 395->401 399->395 399->400 400->391 401->401 404->354 404->370 406->407 411 210dce7-210dcea 406->411 407->354 419 210dd3e 407->419 408->391 409->408 411->379 414 210dcec-210dd01 call 210f274 411->414 414->419 419->379
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0210DACF
                                        • VirtualFree.KERNELBASE(00000000,00000000,0000C000), ref: 0210DE13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Virtual$AllocFree
                                        • String ID:
                                        • API String ID: 2087232378-0
                                        • Opcode ID: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                        • Instruction ID: 63020fefbc9be2c8a79f1741635c5e1b36e1be144332f8a2f2ee76f3073dbc6a
                                        • Opcode Fuzzy Hash: 913584bddb567b179a3f9b4e0e6654d789e61ea3d5744fe4b2293047c08ef92d
                                        • Instruction Fuzzy Hash: 2AB1C031580706AFDB35AEA4ECC0BA7B7E9FF46304F140919E959861C0E7B2E551CFA2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 681 20f7df2-20f81b6 682 20f81b8-20f81bd 681->682 683 20f81bf-20f81da 682->683 684 20f81dc-20f8215 682->684 683->682 685 20f8217-20f821f 684->685 686 20f8235-20f82cf 685->686 687 20f8221-20f8233 685->687 688 20f82d1-20f82d4 686->688 687->685 689 20f82ff-20f8333 688->689 690 20f82d6-20f82fd 688->690 691 20f8335-20f833d 689->691 690->688 692 20f833f-20f8351 691->692 693 20f8353-20f83b5 691->693 692->691 694 20f83b7-20f83ba 693->694 695 20f83bc-20f83d7 694->695 696 20f83d9-20f840d 694->696 695->694 697 20f840f-20f8412 696->697 698 20f8414-20f842f 697->698 699 20f8431-20f8437 697->699 698->697 700 20f8439-20f843f 699->700 701 20f8446-20f8458 700->701 702 20f8441 700->702 704 20f845c-20f8462 701->704 705 20f845a 701->705 703 20f84d7-20f8514 call 20d5e32 * 2 702->703 706 20f84c8-20f84cb 704->706 707 20f8464-20f84c5 call 20fd7e2 704->707 705->706 710 20f84cd-20f84d0 706->710 711 20f84d5 706->711 707->706 710->700 711->703
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "$,$4$5$@$A$C$D$D$D$E$G$I$I$K$L$M$M$O$O$Q$Q$R$S$T$U$W$W$X$X$Y$[$\$]$]$_$_$`$a$c$e$g$g$i$k$m$n$o$o$q$r$s$u$u$w$y${$|$}
                                        • API String ID: 0-1098736463
                                        • Opcode ID: 07f120719a5796ee8f2f401f98331c6a1a843580c82a45bc371b9ab24683da94
                                        • Instruction ID: 99d963d3aacdc92ae7b90899d86cb329623813e9d47ece0b8776a1482eb8c508
                                        • Opcode Fuzzy Hash: 07f120719a5796ee8f2f401f98331c6a1a843580c82a45bc371b9ab24683da94
                                        • Instruction Fuzzy Hash: FE22EC209087E98DDB32C6388C487D9BFB15B67324F0842D9D1E96B2D2C7B50B85DF66

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 728 20f7960-20f7a61 729 20f7a63-20f7a66 728->729 730 20f7a68-20f7ab2 729->730 731 20f7ab4-20f7aeb 729->731 730->729 732 20f7aed-20f7af5 731->732 733 20f7b0b-20f7b72 732->733 734 20f7af7-20f7b09 732->734 735 20f7b74-20f7b77 733->735 734->732 736 20f7bce-20f7bfc 735->736 737 20f7b79-20f7bcc 735->737 738 20f7bfe-20f7c06 736->738 737->735 739 20f7c1c-20f7c75 738->739 740 20f7c08-20f7c1a 738->740 741 20f7c77-20f7c7a 739->741 740->738 742 20f7cad-20f7cd8 741->742 743 20f7c7c-20f7cab 741->743 744 20f7cda-20f7cdd 742->744 743->741 745 20f7cdf-20f7cfa 744->745 746 20f7cfc-20f7d02 744->746 745->744 747 20f7d04-20f7d0a 746->747 748 20f7d0c 747->748 749 20f7d11-20f7d23 747->749 750 20f7d96-20f7dc5 call 20d5e32 * 2 748->750 751 20f7d27-20f7d2d 749->751 752 20f7d25 749->752 753 20f7d87-20f7d8a 751->753 754 20f7d2f-20f7d84 call 20fd7e2 751->754 752->753 757 20f7d8c-20f7d8f 753->757 758 20f7d94 753->758 754->753 757->747 758->750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: !$#$%$%$&$'$)$)$+$-$/$0$1$3$5$5$7$9$;$<$=$>$?$@$A$A$F$H$J$K$N$S$Y$\$^
                                        • API String ID: 0-1105601194
                                        • Opcode ID: 9b3c312f4d815129af7482d2aac7103459aa2b3d76412cbc457a7c7caf0e0d14
                                        • Instruction ID: 78978d8852aefa3957829c35c6943543a030e2a5d3a98b6e1e72be5c5cb76a5c
                                        • Opcode Fuzzy Hash: 9b3c312f4d815129af7482d2aac7103459aa2b3d76412cbc457a7c7caf0e0d14
                                        • Instruction Fuzzy Hash: 5EE18021D087E98ADB22C6BC88443DDBFB15B56324F0843D9D5A46B3E2C7754A46CBA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: !d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d$!d
                                        • API String ID: 0-74847627
                                        • Opcode ID: e930722a54d5859a7c7d5339ac4bf6f78a68cc5947ec76fa0a1249fff59b9bf4
                                        • Instruction ID: 223f8c0d1e407b0378d7e8864bd971321348ae34120cb57269dce1b1218e5e5d
                                        • Opcode Fuzzy Hash: e930722a54d5859a7c7d5339ac4bf6f78a68cc5947ec76fa0a1249fff59b9bf4
                                        • Instruction Fuzzy Hash: C9A27575A593009BE325CF24CC81B6BBBE3FBD5304F29892CE6819B255DB74D901DB42
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: c6e$'g>i$*s,u$*{-}$7w(y$<k;m$@@$B?o!$E+G-$Ix$J'G)$R/Q$TK$]3R5$_7T9$cE$gX$^P
                                        • API String ID: 0-909947336
                                        • Opcode ID: 6df840ea809ea582fedfa04ed4cc2bf5bfba667ee6324b6c295675143950d415
                                        • Instruction ID: f51a73eb46924b4833a50841d6153f66e49aa8e1f5601c99162c909fda2805ed
                                        • Opcode Fuzzy Hash: 6df840ea809ea582fedfa04ed4cc2bf5bfba667ee6324b6c295675143950d415
                                        • Instruction Fuzzy Hash: 4F32EAB460C3918AC334CF64C4027DFBBF2EB92304F40892CC5E96B256D7B5464A9B97
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,-1B69B7A5), ref: 00404D14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: 8kN2$Dd32$Iern$dl?2$el32$el32$kern$kern$lloc
                                        • API String ID: 1029625771-2110291789
                                        • Opcode ID: 4fef5545c8f4f9f91ed4f6163058f676129f8d4546ce305992489ac3a73b7d5f
                                        • Instruction ID: a395ffc6bdf6ba5864528507bce8c91081d2db81a7af191b2929abe29f4557bf
                                        • Opcode Fuzzy Hash: 4fef5545c8f4f9f91ed4f6163058f676129f8d4546ce305992489ac3a73b7d5f
                                        • Instruction Fuzzy Hash: D4E1D577C503208FD708EF76EE8646A3662FB90319302963ED942B75B6CF3919018ACD
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,-1B69B7A5), ref: 00404D14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: 8kN2$Dd32$dl?2$el32$el32$kern$kern$lloc
                                        • API String ID: 1029625771-3383823138
                                        • Opcode ID: dc87da468aa95f523bf83184c2ef42235ea01f588ff994cb5b3e0daed1aaf073
                                        • Instruction ID: 3fe5a11a4a86eccc7bfe225244ac8990f2808fce7754665156b3a855b556a16c
                                        • Opcode Fuzzy Hash: dc87da468aa95f523bf83184c2ef42235ea01f588ff994cb5b3e0daed1aaf073
                                        • Instruction Fuzzy Hash: 8BD1E377C543248FD708EF76EE8646A3662FB90309302963ED902B76B5CF3919058ACD
                                        APIs
                                        • LoadLibraryA.KERNEL32(?,-1B69B7A5), ref: 00404D14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: 8kN2$Dd32$dl?2$el32$el32$kern$kern$lloc
                                        • API String ID: 1029625771-3383823138
                                        • Opcode ID: e7cd25aba92ca2a3baf7792a9721df857903e4c9a578cfdffca9e01928c731fa
                                        • Instruction ID: d4db30c9edc095f5ceb8fba1d2202719ac99180c35b26cb9b85e8662f70bcf33
                                        • Opcode Fuzzy Hash: e7cd25aba92ca2a3baf7792a9721df857903e4c9a578cfdffca9e01928c731fa
                                        • Instruction Fuzzy Hash: 2BC1E377C543248FD708EF76EE8646A3662FB90309306963ED902B76B5CF3919058ACD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: * ,)$, .!$/ay'$3qi_$4>0s$IvHM$KA5C$Y$iL$kQRj$nQkb
                                        • API String ID: 0-679520836
                                        • Opcode ID: 32ae8231fc42d4b879e493d5aaed9674c0b8c4083451491e67bbba3b31af7a44
                                        • Instruction ID: a8a7f57c9ab460e427a35337a3711f422a8452eb5157adc353b548700357eb23
                                        • Opcode Fuzzy Hash: 32ae8231fc42d4b879e493d5aaed9674c0b8c4083451491e67bbba3b31af7a44
                                        • Instruction Fuzzy Hash: 9EB1F7B174C3958BD326CF35889035BBFE1AFD6204F19896DE8D58B341D339890AD792
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: !d$!d$!d$!d$!d$!d$!d$!d$!d$!d
                                        • API String ID: 0-688171476
                                        • Opcode ID: c0a727b38aced11c5a81ebee5f5bae3e14a180c4ac9f2e70b9d672491611fa69
                                        • Instruction ID: b4649a7b87e0a8b9fa519de8f79b7494ea4e949a3133d11767cdbe42b4843653
                                        • Opcode Fuzzy Hash: c0a727b38aced11c5a81ebee5f5bae3e14a180c4ac9f2e70b9d672491611fa69
                                        • Instruction Fuzzy Hash: 3691267AA563209BE325CB048C81A6BB3E7FBE5701F59C12CD78567215DB309D02D786
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                        • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                        • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 107509674-3733053543
                                        • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                        • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                        • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                        • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ($+$.$>$Y$j$t$t$~
                                        • API String ID: 0-137854095
                                        • Opcode ID: 89b97d235b2b0e7f63980cca835740201d8706d8c8be19ce321a4b2e8c85790d
                                        • Instruction ID: 680f389f5824d852ab002ced31c690b973f66bf73f71a8a23b85597219ab84a6
                                        • Opcode Fuzzy Hash: 89b97d235b2b0e7f63980cca835740201d8706d8c8be19ce321a4b2e8c85790d
                                        • Instruction Fuzzy Hash: C781FF2264D7D14AD3528638884429FAFC21BE3234F2CCFACE5F5977D6C569C50693A3
                                        APIs
                                        • GetModuleHandleA.KERNEL32(004045CC,?,00409C60), ref: 00404582
                                        • GetProcAddress.KERNEL32(00000000,004045DC), ref: 0040458F
                                        • GetProcAddress.KERNEL32(00000000,004045F4), ref: 004045A5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: el32$gl32
                                        • API String ID: 667068680-1212234834
                                        • Opcode ID: bbe7c076d9a085b82992743bd6d7a5ac0342887370a36db6df0c086d68587e87
                                        • Instruction ID: ce6abfdaa4c488f79f1566206a4e06ccef182e175c079ceb01f60ecae041d7c0
                                        • Opcode Fuzzy Hash: bbe7c076d9a085b82992743bd6d7a5ac0342887370a36db6df0c086d68587e87
                                        • Instruction Fuzzy Hash: FFE10876D503248FD744FF76AE8652A3762FB90308346963EE942F71A6CF3854019ACE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 5@AB$V~<$[LI_$[LI_$L0N$p.r$|~
                                        • API String ID: 0-4162511336
                                        • Opcode ID: 3d6a0af01880c53217fe9087e0b555641b698f0608426e1c92ad6ad47da4bc08
                                        • Instruction ID: 87d007490f97c2367171d334de618391c75b0dfe2ab3be9c56aba1f8057f6071
                                        • Opcode Fuzzy Hash: 3d6a0af01880c53217fe9087e0b555641b698f0608426e1c92ad6ad47da4bc08
                                        • Instruction Fuzzy Hash: 13C149B160C3504BD315DF24C8512AFFBE2ABC1608F18896DE8DA9B356E375C50ADB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: '$)$+$-$/$z
                                        • API String ID: 0-3830927749
                                        • Opcode ID: d9bdf2d522b2e7fe6725e5fa3bf903287e331715f59a2ec9417540c63356d7fd
                                        • Instruction ID: 665bac44f188e9abca25eeb5a831b542ad89d2022b95d73a9016ccd0d2050edb
                                        • Opcode Fuzzy Hash: d9bdf2d522b2e7fe6725e5fa3bf903287e331715f59a2ec9417540c63356d7fd
                                        • Instruction Fuzzy Hash: 5A124761108BC18ED316CB3C8848756BFD16B66224F0DC7DDE4EA8F3E3D669D50687A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: '$)$+$-$/$z
                                        • API String ID: 0-3830927749
                                        • Opcode ID: fa932c6d41ee690fee6acec50a9b2988c0f930675c14c77ca712f7124b95b077
                                        • Instruction ID: 0a1ba0d9375fa27d58ee132304314b1302527f79cb33bccd093dfc5b9b722355
                                        • Opcode Fuzzy Hash: fa932c6d41ee690fee6acec50a9b2988c0f930675c14c77ca712f7124b95b077
                                        • Instruction Fuzzy Hash: BE124761108BC18ED716CB3C8898A56BFD15B66224F0DC6DDD4EA8F3E3C679C506C762
                                        APIs
                                        • GetProcAddress.KERNEL32(00000002), ref: 004056D7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: ualA$ualA$ualA
                                        • API String ID: 190572456-3615168271
                                        • Opcode ID: d592a81cc7fca46ae3329453e9a68aa271ae1cd37aa715461825f10db0415666
                                        • Instruction ID: 81774da39554bedd731861a1661fa41fefd8ff06d1a856f0cf1985483ddd7805
                                        • Opcode Fuzzy Hash: d592a81cc7fca46ae3329453e9a68aa271ae1cd37aa715461825f10db0415666
                                        • Instruction Fuzzy Hash: D92228779543214FD758EF76EE8646A3252F7C0318342863EE942FB5AACF3855028ACD
                                        APIs
                                        • GetProcAddress.KERNEL32(00000002), ref: 004056D7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID: ualA$ualA$ualA
                                        • API String ID: 190572456-3615168271
                                        • Opcode ID: e0fbeaab5312f794b77492d95c1a3d64c3e21b336e9e0a51c8b78672ea474aaa
                                        • Instruction ID: aad40b1f8c478c3e4b24d984e5f4c9991d70aab6a0182f55370ac57a71e225df
                                        • Opcode Fuzzy Hash: e0fbeaab5312f794b77492d95c1a3d64c3e21b336e9e0a51c8b78672ea474aaa
                                        • Instruction Fuzzy Hash: CA1226779443254FD748EF76EE8646A3352EBC0318342863EE542FB5AACF3855428ACD
                                        APIs
                                        • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                        • VirtualQuery.KERNEL32(?,?,0000001C,?), ref: 00409B4D
                                        • VirtualProtect.KERNEL32(?,?,00000040,?,?,?,0000001C,?), ref: 00409B8E
                                        • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,?,?,0000001C,?), ref: 00409BC0
                                        • VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C,?), ref: 00409BD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: Virtual$ProtectQuery$InfoSystem
                                        • String ID:
                                        • API String ID: 2441996862-0
                                        • Opcode ID: e9377b5afe5b72dea238361b2bb5871f3a0709df6bf3f14a5dd1c9312b56f1de
                                        • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                        • Opcode Fuzzy Hash: e9377b5afe5b72dea238361b2bb5871f3a0709df6bf3f14a5dd1c9312b56f1de
                                        • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .CEM$1$747=$<?nn$KR
                                        • API String ID: 0-4015433853
                                        • Opcode ID: 3e9cfba212479f1620f1b80cf2bbd678b2e96b7ba27c3f2f11c8708b3d1fe90f
                                        • Instruction ID: 7acecbe9a6504cd90ca0fe888d317b052158493762e97568afeaa8579a1f2850
                                        • Opcode Fuzzy Hash: 3e9cfba212479f1620f1b80cf2bbd678b2e96b7ba27c3f2f11c8708b3d1fe90f
                                        • Instruction Fuzzy Hash: 3342277060C3518FCB26CF24C89076EBBE2AFD6314F088A6CE8D69B392D7758545DB52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $!@$,$^$ycz|
                                        • API String ID: 0-3869496633
                                        • Opcode ID: dacc9fbc2794b1f6d94a1fe947db830ab28ae54d49f502b510ad564070bd3a9e
                                        • Instruction ID: ba948b16285359995f55bc28a82b7bb275512771ed31fd7e38f980760502d8fe
                                        • Opcode Fuzzy Hash: dacc9fbc2794b1f6d94a1fe947db830ab28ae54d49f502b510ad564070bd3a9e
                                        • Instruction Fuzzy Hash: B732EF71E083548FDB04CF78C8913AEBFF1AB49324F1846ADD896A73D1D6388985DB52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 12$HRf$LRf$e:d<$~>d0
                                        • API String ID: 0-2492380621
                                        • Opcode ID: 95d11f2b528a3cbbd6fc672cd3e997bc7cc7ecefc92320e33db5954d6424384b
                                        • Instruction ID: 2266bca78ac5e39e08f4de1b6f7bb291c24b8ab632c69319cbaa18c1bfbdde8b
                                        • Opcode Fuzzy Hash: 95d11f2b528a3cbbd6fc672cd3e997bc7cc7ecefc92320e33db5954d6424384b
                                        • Instruction Fuzzy Hash: FEC13571A083005FDB28DF2488926BBB7E1EF91324F1D956CE89697381E338D9849756
                                        APIs
                                        • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                        • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                        • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLockSizeof
                                        • String ID:
                                        • API String ID: 3473537107-0
                                        • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                        • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                        • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                        • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: :$Vtuv$nL>N$|~
                                        • API String ID: 0-3788807405
                                        • Opcode ID: ade14b9d72d28de05d8d3afa69b034f0735ad1b023d55de446fe516c8a9d4a95
                                        • Instruction ID: 3f0d82447be0f64f913522ae3a6b0cdf21d5dcc3b74165623a589687f76d24bb
                                        • Opcode Fuzzy Hash: ade14b9d72d28de05d8d3afa69b034f0735ad1b023d55de446fe516c8a9d4a95
                                        • Instruction Fuzzy Hash: BD12FDB2A483409BD350CF64C880B9BBBE5FBC5714F18892DF6819B791D779D906CB82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: HO$KK$PR$XG
                                        • API String ID: 0-1829590549
                                        • Opcode ID: ec2bd1beddd6af801159e405beb10dedfb130d94ca506c108364c87c68f413be
                                        • Instruction ID: a62edcec742036551cdf960aae9cafdaf63eca13a86aebacd49597b21a9f662c
                                        • Opcode Fuzzy Hash: ec2bd1beddd6af801159e405beb10dedfb130d94ca506c108364c87c68f413be
                                        • Instruction Fuzzy Hash: 00F119726093108BC728CF28C8817ABB7E2FFD9714F599A2DE8C95B354E3749901DB46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: HD$Oy$cv$yL
                                        • API String ID: 0-3619986075
                                        • Opcode ID: 0093d78f47166acbd76a8f0da67422d1189f5240c746ade36b22c47a8b9c1f59
                                        • Instruction ID: f2e34385e0ab47e2df5faf813da33a08637108b0cabdd97d8d07c11d6e3b99de
                                        • Opcode Fuzzy Hash: 0093d78f47166acbd76a8f0da67422d1189f5240c746ade36b22c47a8b9c1f59
                                        • Instruction Fuzzy Hash: 47D111B1A0C3218BCB24CF29C89136BB3E2EFD5314F18992CE9D65B790E3798941D746
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 'D'F$4T0V$G,Q.$Gx
                                        • API String ID: 0-1171825240
                                        • Opcode ID: 843b1d74c268665a03d9df7252fd1c9a4803e2c6ea6531953c0ea4c5912b644f
                                        • Instruction ID: fcb7b4a095049eca05d135aea186b4329a82518e762a34393898467951a19f23
                                        • Opcode Fuzzy Hash: 843b1d74c268665a03d9df7252fd1c9a4803e2c6ea6531953c0ea4c5912b644f
                                        • Instruction Fuzzy Hash: 049134759083108BC714CF25C8A2BABB7F1EFD1314F099A6CE8C98B391E7789544D796
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "",'$'.>"$)c[)$}
                                        • API String ID: 0-4233123008
                                        • Opcode ID: dd0c23818e54c131ccfd9d59e18724053dfa3d9400d82f863107a4ef844516f3
                                        • Instruction ID: e81e1825c4e0a44f6b3c1cbb021e42752bbb25cd54f902eb6e97e659b805aac0
                                        • Opcode Fuzzy Hash: dd0c23818e54c131ccfd9d59e18724053dfa3d9400d82f863107a4ef844516f3
                                        • Instruction Fuzzy Hash: B351E96120C3D68AD7128F35945076FFFE0AF93244F2899AEE4C597242C339C54AE722
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: -@aB$<L(N${|$|~
                                        • API String ID: 0-808748806
                                        • Opcode ID: 9ec71d71c34a9541b7ad1f0ec3e9c12139c8f4ec45e7b48bf6a516cff28ef6c4
                                        • Instruction ID: 01cf3906f1b6d214ec88949e5227d53fd9326f80651e5c4724ae4236a2f14530
                                        • Opcode Fuzzy Hash: 9ec71d71c34a9541b7ad1f0ec3e9c12139c8f4ec45e7b48bf6a516cff28ef6c4
                                        • Instruction Fuzzy Hash: BA71FEB290D3849BD308DF69C85296FBBE2EBC1304F49991CF4D49B315C639CA09DB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: HRf$LRf$f
                                        • API String ID: 0-855236467
                                        • Opcode ID: 61318849fa5ca7ed00cc6e06fa0a9861715aa42c66d1a312a38c38f6c6dd71fb
                                        • Instruction ID: 662898cd23733129f88b1ce9ba3c882e48984654507e9382d9f73d1947779ae6
                                        • Opcode Fuzzy Hash: 61318849fa5ca7ed00cc6e06fa0a9861715aa42c66d1a312a38c38f6c6dd71fb
                                        • Instruction Fuzzy Hash: 9D12037158C3458FE795CF24C881B2BBBE1EBC5318F188A2DE6D5976A1D730E841DB82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: -3/$0$;<
                                        • API String ID: 0-2161355812
                                        • Opcode ID: 0bb427734fc8dd9ec9abef6a0b0e65a869a7e8a3542c76a1ee704a0bff58f30e
                                        • Instruction ID: dc7ec1bbe925f67c5a8fd06b14fe227a06cc796efb47af6b55e3edf716c20903
                                        • Opcode Fuzzy Hash: 0bb427734fc8dd9ec9abef6a0b0e65a869a7e8a3542c76a1ee704a0bff58f30e
                                        • Instruction Fuzzy Hash: 35D1787211A3418BC769CF28C4A1BBBBBE2FF96318F18555CE4D24B391E3798405D762
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ,$RS$s
                                        • API String ID: 0-3270998986
                                        • Opcode ID: 87f53a0a4daf606007bb89a4b55cc93c0a69d98983e286beb7df8982eb3ebe82
                                        • Instruction ID: 1e6b4a169b7974354569970dbf3626ea1ef7413490f0d99fede5641f7edb6f47
                                        • Opcode Fuzzy Hash: 87f53a0a4daf606007bb89a4b55cc93c0a69d98983e286beb7df8982eb3ebe82
                                        • Instruction Fuzzy Hash: B1D14BB2A083548BD718DF35C8516AFBBE2EBD1314F18892DE5D59B390D738C905CB92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $$@0^v$oa
                                        • API String ID: 0-716873481
                                        • Opcode ID: e3bfd9765cbe70a5df6900c577a396747c6e740a0ecc588a7d991f1133180e9b
                                        • Instruction ID: cf1d6755e6b60fdf1e90982f7199aa1cef2dc866585cb81333618f9acd59572c
                                        • Opcode Fuzzy Hash: e3bfd9765cbe70a5df6900c577a396747c6e740a0ecc588a7d991f1133180e9b
                                        • Instruction Fuzzy Hash: 24C1F371A0C3D18FD73ACF2984503ABBBE2AFD7204F18896ED4DA9B282CB744505C752
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: $$@0^v$oa
                                        • API String ID: 0-716873481
                                        • Opcode ID: 22a8de168c945b0a3061c55a024772c9e4e2ea676eaafbf0478ebf3bfab461d0
                                        • Instruction ID: 118d5239556b29f5f07eeb8c4a50d518dd73ad35b1d7f994fc86fa13f0a07df1
                                        • Opcode Fuzzy Hash: 22a8de168c945b0a3061c55a024772c9e4e2ea676eaafbf0478ebf3bfab461d0
                                        • Instruction Fuzzy Hash: C1B11471A083918FD73ACF29C4603ABBBE2AFD7210F18856ED4DA9B381DB754505C792
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 5Z$K\$ZE
                                        • API String ID: 0-3402789328
                                        • Opcode ID: e4a26605fb95898e57386cbcab0a65f9622b03229af0cdb7eb3f466ed1e76423
                                        • Instruction ID: 797cfde95a88a921f5944c6f3e6a7c2a94e4ccadfb69c4194c65241dd0cf8f33
                                        • Opcode Fuzzy Hash: e4a26605fb95898e57386cbcab0a65f9622b03229af0cdb7eb3f466ed1e76423
                                        • Instruction Fuzzy Hash: 8F9167726093218BC725CF28C8A17ABB7F2FFC9754F098A6DE4D64B694E7388501D742
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 0:41$7$82<9
                                        • API String ID: 0-1187993781
                                        • Opcode ID: 92259766b158d09afd5443e074bc2e698efaa555a2aaf35817fde80188ce1e5b
                                        • Instruction ID: 878cea9aaa5576d1afba80299935d6a3a140a236897901a74fda73b6aec92bb4
                                        • Opcode Fuzzy Hash: 92259766b158d09afd5443e074bc2e698efaa555a2aaf35817fde80188ce1e5b
                                        • Instruction Fuzzy Hash: EB61E2B250C3818FC721CF28C48076EBBE2AFD6200F198A5DE5D687282D735D94ADB52
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 4516$715F$BC09
                                        • API String ID: 0-2816261542
                                        • Opcode ID: ed4637a98e98668c163f6f3393edd73b9640235a52ec5922644893961c039e8d
                                        • Instruction ID: 0e30dbe4b1109105738a17910082f6eadd482c16a239d9620263dd548e3c600c
                                        • Opcode Fuzzy Hash: ed4637a98e98668c163f6f3393edd73b9640235a52ec5922644893961c039e8d
                                        • Instruction Fuzzy Hash: 4A51F3B5600B418BD765CF39CC916A7BBE3BF8A314B58C56CC4968B705DB38E442C750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: +|-~$/pqr$_
                                        • API String ID: 0-1379640984
                                        • Opcode ID: 9ab47c0ce2bc290ed1c2c55ff70e9872b734cb922de93da0ecb2b53517232944
                                        • Instruction ID: 5effb4f4dbf85f5d0b9c1f7234e07fe65db32373a2137d1b957eec048da7e607
                                        • Opcode Fuzzy Hash: 9ab47c0ce2bc290ed1c2c55ff70e9872b734cb922de93da0ecb2b53517232944
                                        • Instruction Fuzzy Hash: 30510F9410879049EB15EF348896B3A7BF1AF49302F1994DECC99DF777E228C2418B5E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 08$9=$R<V)
                                        • API String ID: 0-768003476
                                        • Opcode ID: 4c62ea6d86867b7855b2ce711ff6e833b081c197e1b09fa2951255e3ba94a491
                                        • Instruction ID: 563ed4141c9f7c8d375af197f02480bcabfa08a4bd4a84c35f5b093e8699b449
                                        • Opcode Fuzzy Hash: 4c62ea6d86867b7855b2ce711ff6e833b081c197e1b09fa2951255e3ba94a491
                                        • Instruction Fuzzy Hash: D13167B4A0C3908FD721DF68944179BBAF5FF82300F409A1CD4E9AB262D77985468B87
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 0$8
                                        • API String ID: 0-46163386
                                        • Opcode ID: b482b8dca7505235c47c4b39858269964b1fc8baed2c7781a967c76a604964c7
                                        • Instruction ID: 60437a59265831fca073a34e1028ff94903fcc9af932c6f2f6aa272207f56268
                                        • Opcode Fuzzy Hash: b482b8dca7505235c47c4b39858269964b1fc8baed2c7781a967c76a604964c7
                                        • Instruction Fuzzy Hash: FF7244B16083409FD765CF18C890BAFBBE5AFC8314F14892DF98987291D376D948DB92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .$9k>m
                                        • API String ID: 0-54712659
                                        • Opcode ID: ab9ec98462c4bee29d9e849343b9788ce5f6dfa8b0cfb25abc92ee9c97f811ea
                                        • Instruction ID: fece19d82f8ff93871f0eec10f789685d57180e665640821d424e5f912d38b8a
                                        • Opcode Fuzzy Hash: ab9ec98462c4bee29d9e849343b9788ce5f6dfa8b0cfb25abc92ee9c97f811ea
                                        • Instruction Fuzzy Hash: E8E1E36174C3D18FD7798B69C8903ABBBE2ABD3214F18896CD4CA4B382DB7444898753
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 234$Cz{|
                                        • API String ID: 0-3276881663
                                        • Opcode ID: f90738bba1fa0a06b7d38f4a190de4ef271c1ef3499fa87bfc53af5663af49b2
                                        • Instruction ID: e527d6d388a0c77f4715eea589732829980ffa4794dc1370365c4f5a28d58cd0
                                        • Opcode Fuzzy Hash: f90738bba1fa0a06b7d38f4a190de4ef271c1ef3499fa87bfc53af5663af49b2
                                        • Instruction Fuzzy Hash: C4C1CCB15183408FC724CF25C86176BB7F1FF92324F098A1CE8928B3A0E7799585DB92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: el32$gl32
                                        • API String ID: 0-1212234834
                                        • Opcode ID: 8e17e6a64b3ee16fdded42f1a6de0052cb5018a70dd96dfd68482eab30a148d7
                                        • Instruction ID: 02101077e77780d3e5a867c24458e1e1348b5550a5d12dbbbc9ef6fbe0400e7a
                                        • Opcode Fuzzy Hash: 8e17e6a64b3ee16fdded42f1a6de0052cb5018a70dd96dfd68482eab30a148d7
                                        • Instruction Fuzzy Hash: 26D1F677D503248BD744FF76EE8646A3762FB90308346963EE942B71A6CB3854029ACD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: el32$gl32
                                        • API String ID: 0-1212234834
                                        • Opcode ID: 90a6764f69772e0139636565ddee076a69a6722ff7019c52dcb7e6063c5d2ff4
                                        • Instruction ID: 887d9ac0dbd09b8908d44a3f65f49d7bd7cf9cf3cbb880048f87350c958397da
                                        • Opcode Fuzzy Hash: 90a6764f69772e0139636565ddee076a69a6722ff7019c52dcb7e6063c5d2ff4
                                        • Instruction Fuzzy Hash: FED1F877D503248BD744FF76EE8646A3762FB90308346963EE942B71B6CB3854029ACD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: el32$gl32
                                        • API String ID: 0-1212234834
                                        • Opcode ID: c698c0eb1fc7ec2115f04fad65252df148a37f3900665569620039af56b0ce23
                                        • Instruction ID: 1a75c52cf38217e82ac9f0050e96ce052cb3f80f67ae44a4a654fcdebe848d34
                                        • Opcode Fuzzy Hash: c698c0eb1fc7ec2115f04fad65252df148a37f3900665569620039af56b0ce23
                                        • Instruction Fuzzy Hash: FCD1F577D503248BD744FF76EE8646A3762FB90308346953EE942B71A6CB3854029ACE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ./#!$;<
                                        • API String ID: 0-1180879440
                                        • Opcode ID: 3beae18a57c322ecd55e7cf3f7a619580026c0784fcb9b6da2d2a27442ed926a
                                        • Instruction ID: a8bc43afc8898a3b1b73ff40815611dcea10b8593fbbd28a54c6f444142d834c
                                        • Opcode Fuzzy Hash: 3beae18a57c322ecd55e7cf3f7a619580026c0784fcb9b6da2d2a27442ed926a
                                        • Instruction Fuzzy Hash: 4AC1E27450D3D18FDB268F2584907ABBBE1EF97204F18885CD4C99B242C779814ADB57
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: el32$gl32
                                        • API String ID: 0-1212234834
                                        • Opcode ID: 2754846b1aa9a88a47e10ad604bbd367bb886732151d522c27538078f281f10f
                                        • Instruction ID: 27900ccd5920fd3491cf02ca7c80f9f29c025962daadb15184cd21d0f9f6c31f
                                        • Opcode Fuzzy Hash: 2754846b1aa9a88a47e10ad604bbd367bb886732151d522c27538078f281f10f
                                        • Instruction Fuzzy Hash: 3DD1F677D503248BD744FF76EE8646A3762FB90308346953EE942B71B6CB3854029ACE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: -$YQRS
                                        • API String ID: 0-2670003640
                                        • Opcode ID: 26ea06ad9296961eaab7ccac087bbd4c11775cab4828ad22ee13998c213da068
                                        • Instruction ID: 7744dd8dd795a339cbafbd2f57426ee1edc1ae2ea4f6e7b637db0b57f88171b3
                                        • Opcode Fuzzy Hash: 26ea06ad9296961eaab7ccac087bbd4c11775cab4828ad22ee13998c213da068
                                        • Instruction Fuzzy Hash: D2B14AB2B083454BC31D8F29D89027EB7E2EBC4314F298A2EE496C73D5D778D9059B85
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: )$IEND
                                        • API String ID: 0-707183367
                                        • Opcode ID: 82cde622111fdd8a6262c0cc06c2a16aea45c9fea288912f122ae4edc8743992
                                        • Instruction ID: a6618091f14b1c988c9ae8fc0f4a0d170885ec14fce3616e4b52fe529d13a49d
                                        • Opcode Fuzzy Hash: 82cde622111fdd8a6262c0cc06c2a16aea45c9fea288912f122ae4edc8743992
                                        • Instruction Fuzzy Hash: F7D19EF15083449FD720DF14CC8579EBBE4AB94304F64892DF999AB381D375E908DB92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ualA$ualA
                                        • API String ID: 0-558424217
                                        • Opcode ID: c345c73ad09b03db6a284c8437bab3517d97960114e0065339adbc9a0d58e072
                                        • Instruction ID: 9eaeec9fc94797bde6615210e1940a34a05c262dbc2ca1ae6ee7a7fea16147d3
                                        • Opcode Fuzzy Hash: c345c73ad09b03db6a284c8437bab3517d97960114e0065339adbc9a0d58e072
                                        • Instruction Fuzzy Hash: 59A136769543258FC308EF7AEE8646A3252F7C0318346963ED543FB5AACF3815428ACD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ualA$ualA
                                        • API String ID: 0-558424217
                                        • Opcode ID: cfff2bbad089ca8a092358ed4c0f23b685080854cce633138b1806ca0b3c8240
                                        • Instruction ID: f89fd5167e97bdab6211a4f445e5bb93c5c306dd307a74eb080b5580a211e9d3
                                        • Opcode Fuzzy Hash: cfff2bbad089ca8a092358ed4c0f23b685080854cce633138b1806ca0b3c8240
                                        • Instruction Fuzzy Hash: 069124369583258FD318EF7AEE8646A3252F7C0318346963ED543FB5AACF38154286CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IDIE$KupQ
                                        • API String ID: 0-2933137991
                                        • Opcode ID: 1d7282ec3efbb629d1c424745926d94a7c74e797e7d6308f05b5b30acd2b9860
                                        • Instruction ID: 9ed53cb481cd4607ece6af91bc302b67cfe1987eaf549c5712da96c3588cdbcc
                                        • Opcode Fuzzy Hash: 1d7282ec3efbb629d1c424745926d94a7c74e797e7d6308f05b5b30acd2b9860
                                        • Instruction Fuzzy Hash: 51512CB2D0C3E04AD7398B3584513A7BFD2ABD3218F1D85AEC9D96B286D73644038746
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IDIE$KupQ
                                        • API String ID: 0-2933137991
                                        • Opcode ID: 9e67a76d2ff6c99442b3d6d5fc412d491b4b045acf56f51acddc395d841b9351
                                        • Instruction ID: 82e674674eee7a6d41484138e4c33e05442c5645f71ba214d985cc06c3fd76d2
                                        • Opcode Fuzzy Hash: 9e67a76d2ff6c99442b3d6d5fc412d491b4b045acf56f51acddc395d841b9351
                                        • Instruction Fuzzy Hash: 4E513BB190C3E04ADB358F3584503A7BFD2ABD3218F1985AEC9D67B246C7364407D756
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: IDIE$KupQ
                                        • API String ID: 0-2933137991
                                        • Opcode ID: dd10bc4212e20131b524c816dab9cb029697992fbb35e90c49cc2a3f464bea17
                                        • Instruction ID: f800eadfd53a642ac3858a9fe5fe3bd58671ff05b564f38e26f1e04255146db6
                                        • Opcode Fuzzy Hash: dd10bc4212e20131b524c816dab9cb029697992fbb35e90c49cc2a3f464bea17
                                        • Instruction Fuzzy Hash: 30413CB190C3D04ADB35CF2584513ABBFD2ABD3218F1885AECAD96B283C7354403C756
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: !d$!d
                                        • API String ID: 0-1514213583
                                        • Opcode ID: feb579ea7e6cb0e806f2f23b4440d9372b40a84398e7398206d6e813a5b2b410
                                        • Instruction ID: c3c9b201dbd2eb37449ea329a93954022622fb03be13526461079e23f2152884
                                        • Opcode Fuzzy Hash: feb579ea7e6cb0e806f2f23b4440d9372b40a84398e7398206d6e813a5b2b410
                                        • Instruction Fuzzy Hash: 652145346623109BE76E8B14CC92F7A72E7FB99301F94842CE282A31D1EB30A511970A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: cwdc$e8
                                        • API String ID: 0-2079913055
                                        • Opcode ID: 0f51b8f6ac32737438fca14280f25893de379916851452ccd22639846337bf36
                                        • Instruction ID: bbc59b9b089535e58ee6634bf44ae2996ec25113f3ce76ffdfb0a7046eadf86b
                                        • Opcode Fuzzy Hash: 0f51b8f6ac32737438fca14280f25893de379916851452ccd22639846337bf36
                                        • Instruction Fuzzy Hash: D7213A7161E3818BD395CF2984A17AFFBE2AFC2204F58986DE0D587341DB34C505CB02
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .8=6
                                        • API String ID: 0-4001590814
                                        • Opcode ID: 4008c04f25b87cda6aba7019eade33a8da00453663ec1fd503b0cd7ef1a541f9
                                        • Instruction ID: db6166a2aba35cffdecd1ca7b8447f54028d96f3bbb81dcf1c49a9ce531cf9e3
                                        • Opcode Fuzzy Hash: 4008c04f25b87cda6aba7019eade33a8da00453663ec1fd503b0cd7ef1a541f9
                                        • Instruction Fuzzy Hash: BA2217B56007418FD32ACF29D8D1A62BBF2FF9621471985ADD4968F762D334E806CF11
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: DEFG
                                        • API String ID: 0-234382317
                                        • Opcode ID: d5de0e57f16a8e8e91635c7f076ff979dd3c76d6def964305493cc9c818af503
                                        • Instruction ID: 4a4d19f22ba167e643400b988b649fa9b0b25ef9d8aa2dea6c60bd1ac8045b18
                                        • Opcode Fuzzy Hash: d5de0e57f16a8e8e91635c7f076ff979dd3c76d6def964305493cc9c818af503
                                        • Instruction Fuzzy Hash: D1A14332B883104BD7288E28C89067FB7A3EBC9314F1EC53CD9965B384DB75AC058782
                                        APIs
                                        • GetSystemTime.KERNEL32(?), ref: 004026CE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: SystemTime
                                        • String ID:
                                        • API String ID: 2656138-0
                                        • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                        • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                        • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                        • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: ~
                                        • API String ID: 0-1707062198
                                        • Opcode ID: 3d95f8db1ec994b5d0c02fa6d1c4e44fee0ec464cd1914f81912a8cdf20a16ba
                                        • Instruction ID: 83a39cf16fe900d27518a14648350829527686d2a49485f6cca4d03155703b9c
                                        • Opcode Fuzzy Hash: 3d95f8db1ec994b5d0c02fa6d1c4e44fee0ec464cd1914f81912a8cdf20a16ba
                                        • Instruction Fuzzy Hash: 42814C765053624FCB128E28C8543AEBBD1AB95224F19C23DDCBA9B7C1D734D805E7D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: h5z7
                                        • API String ID: 0-2417693688
                                        • Opcode ID: b5a1b98a36e0722e9944fa8836647d82bdd2e7df30f2c9f9e4aee75dd4919a37
                                        • Instruction ID: fc4bcdb6466847d989464ab8d729fc477ce408b3519b54e43565bc3ed9972352
                                        • Opcode Fuzzy Hash: b5a1b98a36e0722e9944fa8836647d82bdd2e7df30f2c9f9e4aee75dd4919a37
                                        • Instruction Fuzzy Hash: 1D6100B19483158ADB20CF14D81176BB3F1FFE5354F189A1CE8D24B391E3799A80D786
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                        • Instruction ID: eb94c974b951754a2525f93f6faea5d023f1c964458aec1997ffcaecddb49e83
                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                        • Instruction Fuzzy Hash: 4D71F932A083158FEB15CE29C88031EB7E2BBC5714F19C56EE49687351D376DDC49B82
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: d
                                        • API String ID: 0-2564639436
                                        • Opcode ID: 68c61f0a19fd474ca282dc414d38f859da30e0f8bac3cf088e6750033e935a97
                                        • Instruction ID: 36102e5d39bb4f92f7c3b16fbfe72d8b35ae7c7d4b5231b93843629a84bc8ed4
                                        • Opcode Fuzzy Hash: 68c61f0a19fd474ca282dc414d38f859da30e0f8bac3cf088e6750033e935a97
                                        • Instruction Fuzzy Hash: 11711A376897908BD32D8E3C4C612AABE934BD7230B1E876DEAF58B7E1D66548059340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: UV
                                        • API String ID: 0-69029679
                                        • Opcode ID: 125180757b677d8c3921de73fe6bb8a63f2bb981cd736e6a368f0068a28dff29
                                        • Instruction ID: 2815722fcd799d2185427676bd0fe5c194aa05a308dbb912d5acc86ea7cf05d7
                                        • Opcode Fuzzy Hash: 125180757b677d8c3921de73fe6bb8a63f2bb981cd736e6a368f0068a28dff29
                                        • Instruction Fuzzy Hash: D1611FB19093418BC710DF14D8916ABBBF1FFA2324F198A1CE9C64B390E376C585DB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: W<
                                        • API String ID: 0-2605491691
                                        • Opcode ID: deec05a1240d17140825e07fad2984c92f390d8d84ad10f463814f8984444530
                                        • Instruction ID: 1bc364fb5bd7284175df30c9d1196a2216300dbba3ee25092e551a5025e3bf42
                                        • Opcode Fuzzy Hash: deec05a1240d17140825e07fad2984c92f390d8d84ad10f463814f8984444530
                                        • Instruction Fuzzy Hash: 8B3124708053818BC72ACF24C4A27EBB3E0FF96318F054E5DD8E64B291E3B8A545D792
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: 0?>=
                                        • API String ID: 0-3891647100
                                        • Opcode ID: 48e059d27937dbb3337ee48a2cf5f1b3fbb63c7acc6e8546127554b78a436b04
                                        • Instruction ID: c84fcb22e7708a177ff92e7d0b609f45c78cc9c0c602d058b2580849f38474cd
                                        • Opcode Fuzzy Hash: 48e059d27937dbb3337ee48a2cf5f1b3fbb63c7acc6e8546127554b78a436b04
                                        • Instruction Fuzzy Hash: B74158B7F542104BDB68CF68CCD0A7AB363FBD6214B2A9278C662977A5C7309C028745
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: a
                                        • API String ID: 0-3904355907
                                        • Opcode ID: fe73f7f3435d7204f2e11eb17e9a91cbb49dd8f8dccdbdc38cd4fe6c9be481a3
                                        • Instruction ID: 4b1d9580fe6aaeca32fd3617de3017428041f0122282843273e9d01596fab643
                                        • Opcode Fuzzy Hash: fe73f7f3435d7204f2e11eb17e9a91cbb49dd8f8dccdbdc38cd4fe6c9be481a3
                                        • Instruction Fuzzy Hash: 17310B73A193508BD305DF28C8805AEBAE3FBC9300F494A5CE5D867750D7718A05DB57
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: !d
                                        • API String ID: 0-3903867909
                                        • Opcode ID: 75aaf7df1149021f5261021a914d1fcc2b0d78f7d1dd06d122ee8d6748a48831
                                        • Instruction ID: 83612cbe17ee3b6b46f68a1af2670acae628ebd9be234ca74e6d3a6b33ac71db
                                        • Opcode Fuzzy Hash: 75aaf7df1149021f5261021a914d1fcc2b0d78f7d1dd06d122ee8d6748a48831
                                        • Instruction Fuzzy Hash: E21121313A87049FCB558FA4CCC096AB7F2FB96308F98097CE6A117262D3709841DB46
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89af8b84d965cc36c3c1016dc0a4f9083dd2f835a324059e58ebbc940991565c
                                        • Instruction ID: 6fb08371ec16a491d1e9548bfc35265bf88b51c8814dd0f0be943ca26fa27081
                                        • Opcode Fuzzy Hash: 89af8b84d965cc36c3c1016dc0a4f9083dd2f835a324059e58ebbc940991565c
                                        • Instruction Fuzzy Hash: BA72E9B2A05B408FD715DF38C88536ABBE2AF95310F198A7DD8EA873D1D635E405DB02
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53d62fa36bec45681f75607a2416d3919e8532adfda70d3637d4176e81aac0ba
                                        • Instruction ID: c51308a770f1d8fd8194d88de6631433603338793ace00f44feeb900085063a1
                                        • Opcode Fuzzy Hash: 53d62fa36bec45681f75607a2416d3919e8532adfda70d3637d4176e81aac0ba
                                        • Instruction Fuzzy Hash: B452BFB15083458FCB15CF28C0A06AEBBE1FF88318F298A6DE8D957341D774E949DB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 99025503f6961f9fe6108dbae163502fadd5235fbbb0a12605ec2cb5db1e2c4b
                                        • Instruction ID: dc75282c46531a702d8b6f9c96c92e50827c0960ef4e9a17290b73b62a467989
                                        • Opcode Fuzzy Hash: 99025503f6961f9fe6108dbae163502fadd5235fbbb0a12605ec2cb5db1e2c4b
                                        • Instruction Fuzzy Hash: D852D7F0908B848FE777CB24C4883AFBBE1EB41314F24896DD5E606AC2D379A585D749
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ae0cce2e7c03b18b9504392e5a9e0d51011ee08d27993f89b83f822f2d37276
                                        • Instruction ID: 66f4aa70ace42e79a7848d87666ecef464cb6f2d00a76777650576071bbf8f2c
                                        • Opcode Fuzzy Hash: 0ae0cce2e7c03b18b9504392e5a9e0d51011ee08d27993f89b83f822f2d37276
                                        • Instruction Fuzzy Hash: 4412E2B2A087558BC725DF18D8806BFB3E2FFC4319F29892DD9C687284D734A811DB46
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 79ce365efed15439f91f7cd96561927a701604761550cb70a059b85a89283ba1
                                        • Instruction ID: 084aeef5b63ebed2c881587a175d158d3e98dd6ebfa2c9b63367c1aa12e4857d
                                        • Opcode Fuzzy Hash: 79ce365efed15439f91f7cd96561927a701604761550cb70a059b85a89283ba1
                                        • Instruction Fuzzy Hash: 213234B8515B108FC379CF29C99052ABBF2BF45210BA04A2ED697A7F90D736F445DB10
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74a8b0975ba6b7d4fc11390cee1aa81942727625cf63e848eb3f09b6f25ff76d
                                        • Instruction ID: 3dde12ba71dc250034c496040acca1e159ac8756eadb7d3ad61850dd061ae6bb
                                        • Opcode Fuzzy Hash: 74a8b0975ba6b7d4fc11390cee1aa81942727625cf63e848eb3f09b6f25ff76d
                                        • Instruction Fuzzy Hash: 8432D4B1A05B408FD724EF38C4953AABBE2AF95310F148A6DD4EB87391D735E409DB42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                        • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                        • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                        • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8febef6685cf24486d77ca7708b644d63d2a4b135186ac7d21ae91547ba95175
                                        • Instruction ID: 769e329cfc0f94aa9119326c3eb4ee6c21a1a5217c2fbcc70c92134d1d2a5adf
                                        • Opcode Fuzzy Hash: 8febef6685cf24486d77ca7708b644d63d2a4b135186ac7d21ae91547ba95175
                                        • Instruction Fuzzy Hash: F202E9F1905B00AFC3A1CF3AC946797BEEDEB4A360F14491EF5AEC7240D63565058BA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ffb5a495243add10bfa5ee9b51a8973b1789339223ee017afd647bfd5cc345d3
                                        • Instruction ID: 00c396db8d7fe330491c49a86ed1b7d399deb2892eb9f78ed3c15a4620ee423c
                                        • Opcode Fuzzy Hash: ffb5a495243add10bfa5ee9b51a8973b1789339223ee017afd647bfd5cc345d3
                                        • Instruction Fuzzy Hash: 3BB158316883049BD7A5CF24C880B6BBBE6EBC5318F15892CE7D957691D731EC05EB82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 61242a3ec428c69189e9d0599d99559f8402a195c3483dfe4c9a938412d44646
                                        • Instruction ID: b68fffd6857114e15f1bd93cfef5b0b00406c5142a6f794e890ba1f6bc741f98
                                        • Opcode Fuzzy Hash: 61242a3ec428c69189e9d0599d99559f8402a195c3483dfe4c9a938412d44646
                                        • Instruction Fuzzy Hash: FDE178B12083818FD321DF69C880A6FFBE5EF98204F54882DE5D587761E375E948DB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8cb7022f27d583263c619afea43001496b97777da7282b309b5d7c8bf801a67
                                        • Instruction ID: 1757106ec17bb15fc1d695eed6e7c8a0cf3c3ba7634f717cdb7e0e8e362656fc
                                        • Opcode Fuzzy Hash: f8cb7022f27d583263c619afea43001496b97777da7282b309b5d7c8bf801a67
                                        • Instruction Fuzzy Hash: CA81E0715053048BD714AF28CC627A7B7F1FF85324F098A2DE8928B391E7B9D908D756
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd8fda7dc3e3f10bf5951faa8307335cbe8bfcc380665bd3d2d7b15aac8646fb
                                        • Instruction ID: 566548ec14ddcb382d6d07bdcdd6c140a46d337ffe20deba42dc0702d5750465
                                        • Opcode Fuzzy Hash: bd8fda7dc3e3f10bf5951faa8307335cbe8bfcc380665bd3d2d7b15aac8646fb
                                        • Instruction Fuzzy Hash: B6A1CEB16083419FCB149F24C891BBBBBA1FFC4318F14895CE98A8B381E775E945DB52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12e3d902446da92d2c5f7b1b9b0da3b8e7261267eba95c43fdbdbeb0a584a330
                                        • Instruction ID: dbc093b84a05b4fc319893b1341fb91b5314e22b9303507ce860c55602e511d6
                                        • Opcode Fuzzy Hash: 12e3d902446da92d2c5f7b1b9b0da3b8e7261267eba95c43fdbdbeb0a584a330
                                        • Instruction Fuzzy Hash: 009105356883158BC7289F28C8D0B6BB3E2FB88714F19853CE9959B394EB71EC45C741
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1b4e56e44c9988b849d154d62c06baeddd75874446e0c9c9bf3dc5ce6994d236
                                        • Instruction ID: 355cd6869daa9365bacb6094bc3171cd23681636bc2bad010090c80000656b44
                                        • Opcode Fuzzy Hash: 1b4e56e44c9988b849d154d62c06baeddd75874446e0c9c9bf3dc5ce6994d236
                                        • Instruction Fuzzy Hash: D7910335A883058BD7149F28C890B6B73E2FFD9714F19853DE9898B395EB70E811CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1457b23521a91baa183de2e8582065ec954a7eb7f432b2df5e24a079f32d492d
                                        • Instruction ID: a94de5b09d8d6ac6e3789d699ba38284af6a4cceb31888f9a7beb7b1b4499bae
                                        • Opcode Fuzzy Hash: 1457b23521a91baa183de2e8582065ec954a7eb7f432b2df5e24a079f32d492d
                                        • Instruction Fuzzy Hash: C99117B2A043104FDB289F68CC96B6BB3E2EBD1308F19843DD987872A5E738D945D751
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44b79e815784397d878c460c927ca73852a8a646888c8050010eebc084a4cdb3
                                        • Instruction ID: 89c05d1b3c9bc8155856f7089694231bad99b9e6e8ceb1750b7a1416617761ed
                                        • Opcode Fuzzy Hash: 44b79e815784397d878c460c927ca73852a8a646888c8050010eebc084a4cdb3
                                        • Instruction Fuzzy Hash: 18C16CB2A087418FC360CF28CC86BABB7F1BF85318F18892DD1D9C6252E778A155CB05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c298a8eb4cb382bcc77e3234aa9cf5843b4c3f814b0bf82b1a67344acb707ac
                                        • Instruction ID: 8d769f2c9df8993ec9bfda1014434e5d390ab802e2aceee58a30737e2b6d4d3a
                                        • Opcode Fuzzy Hash: 9c298a8eb4cb382bcc77e3234aa9cf5843b4c3f814b0bf82b1a67344acb707ac
                                        • Instruction Fuzzy Hash: 248126366853118BC7249F28C8D0B6FB7A2EFCC754F1A852CE9959B3A4DB70E851C781
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd2414a1a90e1d08a6129117832b489066f250707ad83306baf5ff26a18860d7
                                        • Instruction ID: 02457361bf9a1dc83e3c4b264acc7cce7cfed104c1f115a7ff45238d39822ae8
                                        • Opcode Fuzzy Hash: bd2414a1a90e1d08a6129117832b489066f250707ad83306baf5ff26a18860d7
                                        • Instruction Fuzzy Hash: CB711737B4AB9247E328893C4C253AA7AD30BD3234F2DC77EE5B68B7E5D56548019340
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d96485befee8235c2f30b6018d8ded46f807b2373d3043f7dada73ba83ee799
                                        • Instruction ID: 5a1eabb9a52439c145eeb8ca7daea81acfb749dd1377f9223e178eec2236ec01
                                        • Opcode Fuzzy Hash: 8d96485befee8235c2f30b6018d8ded46f807b2373d3043f7dada73ba83ee799
                                        • Instruction Fuzzy Hash: 4A517C717883044FE3A5DF28CC8162BB7E2EBD6314F28893ED78197741D731A816AB12
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d80c49381b62056c50eb6e2069c9ebdb6415fb32587307115fea77fd02697e2
                                        • Instruction ID: 9489cadfc57028ffebb9f65e8ae4063548852343402475218b0c1b32ff296df2
                                        • Opcode Fuzzy Hash: 9d80c49381b62056c50eb6e2069c9ebdb6415fb32587307115fea77fd02697e2
                                        • Instruction Fuzzy Hash: AC91343158C3858BC3958B2C888436EBBE1ABCA328F184B6DE6E5877E1C375C545D747
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4f103b7b59b6263a90c6b95f954683e57fa3c029ac85479d74bb1740069586f
                                        • Instruction ID: 1104e62ed91c9303a940d24b5f9a2751a440de8b5bf89f5d7809124bdf1f2bb2
                                        • Opcode Fuzzy Hash: d4f103b7b59b6263a90c6b95f954683e57fa3c029ac85479d74bb1740069586f
                                        • Instruction Fuzzy Hash: 6051D3B93983408BE76ECF15C8D0A3973A7FBD9304B79957CC58657661CB30AC01EA15
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f9bbba2d45ac230f0f69769ca10a7cb41ae09c5558e4a776c371d4608edba11
                                        • Instruction ID: 1a47f82245e82a3ee99617d2037d5fcc128250f1c5e0fab9acdbad512c5b54d6
                                        • Opcode Fuzzy Hash: 7f9bbba2d45ac230f0f69769ca10a7cb41ae09c5558e4a776c371d4608edba11
                                        • Instruction Fuzzy Hash: CF8195B69543218FE34CCF39EE965A63BA2F780314301923ED942E7675DB3851458BCC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c49f9fbf494971df7976483a720df3bd6969ead224a28774ce98057b7019990
                                        • Instruction ID: b8f07374734b745f250a7f5d69fc604856d3a3352574c8ea2779fb0ea3564d4b
                                        • Opcode Fuzzy Hash: 0c49f9fbf494971df7976483a720df3bd6969ead224a28774ce98057b7019990
                                        • Instruction Fuzzy Hash: 1251FAB1A503008FDB14DF25C892BAA3F72FB45304F5591ACD9569F35ACB358842DB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 526873104174284fe48d938f4529c780dcacaffbe3c1effbbae70a102d0ce669
                                        • Instruction ID: ba51937698db2abc082f010d8108346b85dd7f4cd7df4067033c9c2bb97e5800
                                        • Opcode Fuzzy Hash: 526873104174284fe48d938f4529c780dcacaffbe3c1effbbae70a102d0ce669
                                        • Instruction Fuzzy Hash: 6E611936B89BD047C3689F7C4C61279BA434F97230B1EC3BEAAF687BE1D61448159390
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c8a0dac19ec6aca44e564460274412bd6f62cf979ad0c3e663c3060c251177c
                                        • Instruction ID: 65dcbbec6a8665e072b397e6c249d8cac178e8aad7b8ebfd7db24162f48c6511
                                        • Opcode Fuzzy Hash: 2c8a0dac19ec6aca44e564460274412bd6f62cf979ad0c3e663c3060c251177c
                                        • Instruction Fuzzy Hash: 737114F2D002428FDF25CA68C4516FEF7B2AF98300F59446AC953AB351D734AE82DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 977b067070f21a98eded21a2731cc20525834af76ba09e01110c0a482553f65d
                                        • Instruction ID: f3bcdde5cb42c4e9822bc56bce9b92a462fa8c579b583be0e8888ddd8dfd762f
                                        • Opcode Fuzzy Hash: 977b067070f21a98eded21a2731cc20525834af76ba09e01110c0a482553f65d
                                        • Instruction Fuzzy Hash: B7515A71B4C3948FCB658A28C4903AFB7E2EBC6204F09855DF6CA8B746C239ED45D781
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75fe9a7ff1e933d72a7d4168b964afefdca25735b7ba55603740c0c5842501f6
                                        • Instruction ID: 8d71c8aa57213cf2c1eb99010929464c1c08b99b2f818f50c1efa2fb2dbe854b
                                        • Opcode Fuzzy Hash: 75fe9a7ff1e933d72a7d4168b964afefdca25735b7ba55603740c0c5842501f6
                                        • Instruction Fuzzy Hash: BE516CB16087548FE354DF29C89439BBBE1BBC4318F048A2DE5E987750E379D6089F92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 531a253513d854624832f0f1268352e5db5cbc68b95306a6018bd7d5f2f5c087
                                        • Instruction ID: 5630b9b0fa7304700fca649b3d5a4dc4fe2803f2311ab0612eeaba16f9f58cfd
                                        • Opcode Fuzzy Hash: 531a253513d854624832f0f1268352e5db5cbc68b95306a6018bd7d5f2f5c087
                                        • Instruction Fuzzy Hash: 8441A1B365C3154FD328CEA9D88139FF6E2FBC4204F09883ED8A597241DA74D6098B92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3afe8cd4c5a2d91c98129b5cd345144b10a66f38c75592216988112a80974251
                                        • Instruction ID: 10fb2e0dc99d17b590fdb1111a7520d910d6fe7b22fe27cd6d6e247f1ad02d88
                                        • Opcode Fuzzy Hash: 3afe8cd4c5a2d91c98129b5cd345144b10a66f38c75592216988112a80974251
                                        • Instruction Fuzzy Hash: 2D314737B893A00BC309DF68DCC0616BBD1FBDA314F0F127D95D4972A2DB6489018B84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 25e52d2553846501074cc6eac3487469e17430b95ddd4215b40ccac7d1349af2
                                        • Instruction ID: c9ce1914e6c52cc0e3f45646c5667012c50df846367a4cfd74af914dc133ef6a
                                        • Opcode Fuzzy Hash: 25e52d2553846501074cc6eac3487469e17430b95ddd4215b40ccac7d1349af2
                                        • Instruction Fuzzy Hash: B4314773D11B2C0BDB098D6D5C11269B2C25BC4221F9E837EDDAA5F3C2DA319C0292D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59ef5a02df10a37f9cd78ca65c58052d67d30c41be72dcb82a72ea05c3567aed
                                        • Instruction ID: f82b82a9384f3afd46c6b8a39d51ffd7aa571e73901461bc1ee953a9b742aa95
                                        • Opcode Fuzzy Hash: 59ef5a02df10a37f9cd78ca65c58052d67d30c41be72dcb82a72ea05c3567aed
                                        • Instruction Fuzzy Hash: 3C3148F56843144BC3215F28989437EBBE5FF86228F39817CE8DA87251E372C905E7A4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                        • Instruction ID: 26b2792f3955c47c3af3cce66b26a36ca1ec45d56a9e6776f6ddd7edaa060e4d
                                        • Opcode Fuzzy Hash: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                        • Instruction Fuzzy Hash: 725162B4E00209DFCB08CF88C590AAEF7B2FF88314F248199D815AB355D375AE81DB94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87409c7ebffde4edca2967101d67f9bb46694813d42340c738a0ef65caa338cd
                                        • Instruction ID: 623b3382f9d280fb50ab56a1d4eaf9309d28231b6737a6c6b145eb173906b7c3
                                        • Opcode Fuzzy Hash: 87409c7ebffde4edca2967101d67f9bb46694813d42340c738a0ef65caa338cd
                                        • Instruction Fuzzy Hash: AE01A1767883411BE358DF64CCD27ABA7E1D7C6718F28743DE98393282C6989C41D64A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c932769af1db5db77f5974673d77e20fef99ae6d7361392a9d1b30d4985e46b
                                        • Instruction ID: 3c71067be2dcc84b46f98b4d2f3707b19b27b6302562d3670b3feee2cf676d7b
                                        • Opcode Fuzzy Hash: 2c932769af1db5db77f5974673d77e20fef99ae6d7361392a9d1b30d4985e46b
                                        • Instruction Fuzzy Hash: 94118C71A516400BDB2D8F25D85266BBBD3AFD6321B2CD33CC48A83B05DA3CE4128B09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43a8c7cce303fee665c1fc4c7e65f333f825770f7e33093f95c7b2e0d9f891a4
                                        • Instruction ID: 02b5902a50c49ff0c1bd3283a7f26a1f07af1bb94bcf66c70b9b0607cd021076
                                        • Opcode Fuzzy Hash: 43a8c7cce303fee665c1fc4c7e65f333f825770f7e33093f95c7b2e0d9f891a4
                                        • Instruction Fuzzy Hash: 46110672E106168BCB58CFA9C8411EBF7F1FF9A310B18C129C415E3254F3389542CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15fc3d2ec8f1f00cb75a4d6a970fb2d85e5a941e36995e029e79fb58121fab0a
                                        • Instruction ID: 2d9ed1c0bfac7f2fe8cd2ba58f8353b243dc2030761b3e26075169ad967c44c2
                                        • Opcode Fuzzy Hash: 15fc3d2ec8f1f00cb75a4d6a970fb2d85e5a941e36995e029e79fb58121fab0a
                                        • Instruction Fuzzy Hash: A7115979A147129BD328CF35C420576B7F1BB45300B18832DC99693750E738E951CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cdcc3c7ad8ce7d95c7535e39806aabba9bd5cba7ee3961789b683d3cd05209ed
                                        • Instruction ID: c26fb7b33883955f9cdc1f93d2d4f95797236f4d1046f024d958edf9a10a9ff0
                                        • Opcode Fuzzy Hash: cdcc3c7ad8ce7d95c7535e39806aabba9bd5cba7ee3961789b683d3cd05209ed
                                        • Instruction Fuzzy Hash: 8921A7B3E507118FD304CF95C88175AFBA2FB94300F59D5A8C5456F646C6B4D8858BC4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                        • Instruction ID: 19f78a63d646728433acc3ac7f300362986b02ceb5f60856238ed32858ee46f7
                                        • Opcode Fuzzy Hash: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                        • Instruction Fuzzy Hash: 333195B4E00249DFCB08CF98C590AAEFBB1FF48314F248599D815AB346D375AA81DF94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                        • Instruction ID: 83af92e05637f479072fdfe584016dab8c5d7d72fd4917dec46a0e55745b0a98
                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                        • Instruction Fuzzy Hash: 37110833A493E40EC3568D3C84805A9BFE70AD3135F5D8399F4F89B2D2C6238D8A9351
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f258c5d221548f275ed8b43bf51db39d56e7a72b1a17639b993a38f7acb0d70
                                        • Instruction ID: 4b2b63a56b49c0478885e14d101f38cb19fb1a62fb8f5e57d2b71276c288e7cd
                                        • Opcode Fuzzy Hash: 0f258c5d221548f275ed8b43bf51db39d56e7a72b1a17639b993a38f7acb0d70
                                        • Instruction Fuzzy Hash: 2301D4F27003414BDF31AF6494D4B3BB3E97F90718F29842DD8164B240EB76E884ABA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a816a1b5ed79dcc473e72af881e77224d438597b890ca7a808e8314cd72f5d69
                                        • Instruction ID: aee1ece592ef492cf971da7c67350df6f184d8e2c62229da21a66e54de9aa222
                                        • Opcode Fuzzy Hash: a816a1b5ed79dcc473e72af881e77224d438597b890ca7a808e8314cd72f5d69
                                        • Instruction Fuzzy Hash: C61151716497118B9B68CF11D81217FBAE2AA81A44FC98C6CE0C38B144D375C555D741
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8dda23cf282c44b283b31ff4621da96a4591eeb2c7fbc2598ead98b9a9ac484
                                        • Instruction ID: 7b461e0838c0a002e96fb3986517569c87a4dceb8d38e77559b3624e32082bb4
                                        • Opcode Fuzzy Hash: b8dda23cf282c44b283b31ff4621da96a4591eeb2c7fbc2598ead98b9a9ac484
                                        • Instruction Fuzzy Hash: 8901F5B5F4A3516FD700DE25AC91A2BBAE6FBE1601F04883CE851C7242EA78D9054A19
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e05958ab2d74afa60cd9b0c470a447c0caff7ff227d7df738881332062c68ec
                                        • Instruction ID: 2f149584fd25dd29244df5f151631b810267a70511a864a15918325823c6ac4f
                                        • Opcode Fuzzy Hash: 1e05958ab2d74afa60cd9b0c470a447c0caff7ff227d7df738881332062c68ec
                                        • Instruction Fuzzy Hash: FF0180B190D3808FD3359F24989969FBBE5EB93300F59492DC0C95A214DB358845CB83
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d8ee802bd6553568b81a28d84e5a886a5cbc8b1b16f449da09c3065d48fb253
                                        • Instruction ID: 71b282cd49e61b929f4b9834eb6f1a85e10961a2710a918077df4a905d14d7a9
                                        • Opcode Fuzzy Hash: 2d8ee802bd6553568b81a28d84e5a886a5cbc8b1b16f449da09c3065d48fb253
                                        • Instruction Fuzzy Hash: 2F016DB084C3018FD719DF20944176FBBE5FB92304F509A2DE1D166152D775C60E8F8A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                        • Instruction ID: 3ad66664e4c862fb364f419baa0c948e4324d73d753edc8a40c3554d49e862c0
                                        • Opcode Fuzzy Hash: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                        • Instruction Fuzzy Hash: F301A474A11608EFCB55EF98C194AACB7B6FB49314F308299D8159B394C731BF41EB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8923d076dd0cf2bcac19f8223a60b52bd71a1bcc81ef9616cd1a3b75f77cf152
                                        • Instruction ID: 5220b0ed5be75a60229b23483b3b388a73c87f6eacdb281932e769ddcf9b4436
                                        • Opcode Fuzzy Hash: 8923d076dd0cf2bcac19f8223a60b52bd71a1bcc81ef9616cd1a3b75f77cf152
                                        • Instruction Fuzzy Hash: 06B092B1D887808B8505EF0498928BAB7799B67310F102428D4096B251EA25E951DB8F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779789449.00000000020C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_20c0000_x4PaiRVIyM.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62984822127642c478f5ace72fcd2fd09851256de30a3e43f83155c55e51e2a9
                                        • Instruction ID: 3a5a42d97e986663ccd2686de74347b817ca597ab40978723763a9c6611f0646
                                        • Opcode Fuzzy Hash: 62984822127642c478f5ace72fcd2fd09851256de30a3e43f83155c55e51e2a9
                                        • Instruction Fuzzy Hash: E5A00224E5C705EF8A1C8F149D905F8E679D78F251FD03828802BF7962DA10DC81D76C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 167d8dd652e4a0b18676e22d1f0b694b3e2050296b10cfa44d62bde203ece273
                                        • Instruction ID: 784134393093e2e5005afeab81820b432fe556bc7fcb11ac55ef8b55b6821f6f
                                        • Opcode Fuzzy Hash: 167d8dd652e4a0b18676e22d1f0b694b3e2050296b10cfa44d62bde203ece273
                                        • Instruction Fuzzy Hash:
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03fdac973c3089c01465a791eacb14a84e7be514df70a27485f1914b6386e0a8
                                        • Instruction ID: 74a8d2e7032187ae17e33d6c56d987dbda54f6fc4e65b82033ec436fbdb79e3a
                                        • Opcode Fuzzy Hash: 03fdac973c3089c01465a791eacb14a84e7be514df70a27485f1914b6386e0a8
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,?,004098D0), ref: 0040704D
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                        • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,?,004098D0), ref: 004070A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AddressCloseHandleModuleProc
                                        • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                        • API String ID: 4190037839-2401316094
                                        • Opcode ID: 7527274d13757591ed95a28b65d500b4314afdc8e6aae835557058d53075206c
                                        • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                        • Opcode Fuzzy Hash: 7527274d13757591ed95a28b65d500b4314afdc8e6aae835557058d53075206c
                                        • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                        • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                        • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                        • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                        • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                        • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                        • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: File$Pointer$CreateHandleReadSizeType
                                        • String ID:
                                        • API String ID: 741532818-0
                                        • Opcode ID: 403414a86dc723bb3cef7f5a1f4ed97203eaa8ae0b3646c9adec8fd6a7129518
                                        • Instruction ID: 024604f3a216e7c6dd34324d53ddcba0102d8b0acb9e3802b94c63e6c99f6cb4
                                        • Opcode Fuzzy Hash: 403414a86dc723bb3cef7f5a1f4ed97203eaa8ae0b3646c9adec8fd6a7129518
                                        • Instruction Fuzzy Hash: D64194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                        APIs
                                        • SetLastError.KERNEL32 ref: 0040A0F4
                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB), ref: 0040966C
                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A131
                                        • SetWindowLongA.USER32(00000000,000000FC,Function_00009918), ref: 0040A148
                                        • RemoveDirectoryA.KERNEL32(00000000,0040A287,Function_00009918,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A234
                                        • 73A25CF0.USER32(00000000,0040A287,Function_00009918,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A248
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                        • API String ID: 3341979996-3001827809
                                        • Opcode ID: 1d45d037bb703eeb04ab3c0565cb9baec541f6386a3d8acef681785d9d42bc6d
                                        • Instruction ID: 62af14def8aeee2ea33bef9e9495f996c0b53bf3921735d96bebdf7865f105d0
                                        • Opcode Fuzzy Hash: 1d45d037bb703eeb04ab3c0565cb9baec541f6386a3d8acef681785d9d42bc6d
                                        • Instruction Fuzzy Hash: 88412A70A00205DFD704EBA9EE86B997BA5EB45304F10427BE510BB3E2DB789801CB5D
                                        APIs
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                        • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                        • API String ID: 1646373207-2130885113
                                        • Opcode ID: 155d58a6923ed0f3d568bab0c15f5a63075791531f7a431787b3bda64a379594
                                        • Instruction ID: 472eec0154f0d1c01dfbc71f8259101f76790119bc09363f7f111e724705e506
                                        • Opcode Fuzzy Hash: 155d58a6923ed0f3d568bab0c15f5a63075791531f7a431787b3bda64a379594
                                        • Instruction Fuzzy Hash: 35015E70608342AEFB00AB729C4AB163A68E786714F60447BF5447A2D3DABD4C04CA6D
                                        APIs
                                        • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A131
                                        • SetWindowLongA.USER32(00000000,000000FC,Function_00009918), ref: 0040A148
                                          • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000), ref: 00406B94
                                          • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90,00000000,00409A77), ref: 00409A14
                                          • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90,00000000), ref: 00409A28
                                          • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                          • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?), ref: 00409A53
                                          • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90), ref: 00409A5C
                                        • RemoveDirectoryA.KERNEL32(00000000,0040A287,Function_00009918,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A234
                                        • 73A25CF0.USER32(00000000,0040A287,Function_00009918,00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 0040A248
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                        • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                        • API String ID: 978128352-3001827809
                                        • Opcode ID: d074aa356e08388772205335c59cb73ac547e770bd50e989d8b46a2422503adf
                                        • Instruction ID: 1dc8ba1ebca63e4a13c0cdd659cb6d357c5997a84de4409b1b672f339ad13816
                                        • Opcode Fuzzy Hash: d074aa356e08388772205335c59cb73ac547e770bd50e989d8b46a2422503adf
                                        • Instruction Fuzzy Hash: 75411970A04205DFD714EBA9EE85B993BA5EB88304F10427FE510B73E1DB789801CB9D
                                        APIs
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90,00000000,00409A77), ref: 00409A14
                                        • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90,00000000), ref: 00409A28
                                        • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                        • GetExitCodeProcess.KERNEL32(?), ref: 00409A53
                                        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,?,00409A90), ref: 00409A5C
                                          • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB), ref: 0040966C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                        • String ID: D
                                        • API String ID: 3356880605-2746444292
                                        • Opcode ID: 1af5f0c9d387fd7b50ad22c7a7f07bddfcf613e0e4cf5b2b2f25cb1012251d12
                                        • Instruction ID: 0d26ff0b069f05ac7fc2137d7bf6f4c2b599b29ad8a4266bf43483a79dbd8d3d
                                        • Opcode Fuzzy Hash: 1af5f0c9d387fd7b50ad22c7a7f07bddfcf613e0e4cf5b2b2f25cb1012251d12
                                        • Instruction Fuzzy Hash: CB1142B17442486EDB10EBE68C52FAEB7ACEF49714F50017BB604F72C2DA785D048A69
                                        APIs
                                        • RtlEnterCriticalSection.KERNEL32(0040C41C), ref: 00401A09
                                        • LocalFree.KERNEL32(?,00000000,00401AB4), ref: 00401A1B
                                        • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00401AB4), ref: 00401A3A
                                        • LocalFree.KERNEL32(?,?,00000000,00008000,?,00000000,00401AB4), ref: 00401A79
                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C), ref: 00401AA4
                                        • RtlDeleteCriticalSection.KERNEL32(0040C41C), ref: 00401AAE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                        • String ID:
                                        • API String ID: 3782394904-0
                                        • Opcode ID: 968c6ade76c7b2a75fe1028d9f4e0e8289ce355ea137b2e174b443c8b7832b12
                                        • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                        • Opcode Fuzzy Hash: 968c6ade76c7b2a75fe1028d9f4e0e8289ce355ea137b2e174b443c8b7832b12
                                        • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400,?,?,?,00000000,004038A0,?,?,004038FC), ref: 004036F2
                                        • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,?,?,00000000,004038A0,?,?,004038FC), ref: 00403710
                                        • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00403729
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocString
                                        • String ID:
                                        • API String ID: 262959230-0
                                        • Opcode ID: 0df95bdfd3d8bd1e4bec1292c0e0917371d4f938ad398a1a9200f32258a1f234
                                        • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                        • Opcode Fuzzy Hash: 0df95bdfd3d8bd1e4bec1292c0e0917371d4f938ad398a1a9200f32258a1f234
                                        • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                        APIs
                                        • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                        • ExitProcess.KERNEL32 ref: 00403DE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: ExitMessageProcess
                                        • String ID: Error$Runtime error at 00000000
                                        • API String ID: 1220098344-2970929446
                                        • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                        • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                        • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                        • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                        APIs
                                        • RtlInitializeCriticalSection.KERNEL32 ref: 0040192E
                                        • RtlEnterCriticalSection.KERNEL32(0040C41C), ref: 00401941
                                        • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                        • RtlLeaveCriticalSection.KERNEL32(0040C41C), ref: 004019C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                        • String ID:
                                        • API String ID: 730355536-0
                                        • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                        • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                        • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                        • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: .tmp$y@
                                        • API String ID: 2030045667-2396523267
                                        • Opcode ID: 991f677c446ce94498c9c91b388df7e612f8d26d70e236d4543ec0d44d3a644a
                                        • Instruction ID: 9654b09d82b51144a4098a2dc8db18680232f6f81bb165c1e960a0c4f18209d5
                                        • Opcode Fuzzy Hash: 991f677c446ce94498c9c91b388df7e612f8d26d70e236d4543ec0d44d3a644a
                                        • Instruction Fuzzy Hash: 6F419F30600204DFC715EF29DE91A5A7BA6FB89304B10453AF801B73E2DB79AC01DBAD
                                        APIs
                                        • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: Message
                                        • String ID: .tmp$y@
                                        • API String ID: 2030045667-2396523267
                                        • Opcode ID: 57c71a79f97d8214337404349d021a78a7642e1ac0288813578a6970e4670f84
                                        • Instruction ID: 26cc71b999f7f6bdec311d51aeea5e314170344188b91b932b157060f98f8833
                                        • Opcode Fuzzy Hash: 57c71a79f97d8214337404349d021a78a7642e1ac0288813578a6970e4670f84
                                        • Instruction Fuzzy Hash: C5418030600204DFC715EF29DE91A5A7BA5FB49304B10453AF801B73E2CB79AC41DB9D
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00406F48,?,?,004098D0,00000000), ref: 00406E4C
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,00406F48,?,?), ref: 00406EBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: QueryValue
                                        • String ID: )q@
                                        • API String ID: 3660427363-2284170586
                                        • Opcode ID: ff505ce2ca144f1e4aae5d4b556339255e799df597b2c0df569adf756f19ba98
                                        • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                        • Opcode Fuzzy Hash: ff505ce2ca144f1e4aae5d4b556339255e799df597b2c0df569adf756f19ba98
                                        • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                        APIs
                                        • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID: .tmp
                                        • API String ID: 1375471231-2986845003
                                        • Opcode ID: eb5f75e9b8cc84f1b7295cfbfb3655c643ace1023327f03151b1ea358cb4b3bc
                                        • Instruction ID: 7d66a9fb3acca2a164fab1eb31a00c007328e74e7b0c548e792a27499ccb9c3a
                                        • Opcode Fuzzy Hash: eb5f75e9b8cc84f1b7295cfbfb3655c643ace1023327f03151b1ea358cb4b3bc
                                        • Instruction Fuzzy Hash: A1213574A002099BDB05FFA1C9429DFB7B9EF88304F50457BE901B73C2DA7C9E059AA5
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                        • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: CommandHandleLineModule
                                        • String ID: U1hd.@
                                        • API String ID: 2123368496-2904493091
                                        • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                        • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                        • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                        • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1779319554.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1779307886.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779333434.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1779356534.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_x4PaiRVIyM.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                        • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                        • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                        • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9