Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wRhEMj1swo.exe

Overview

General Information

Sample name:wRhEMj1swo.exe
renamed because original name is a hash value
Original sample name:d7ae3392a9ce8d10923040dd4c3ef0af.exe
Analysis ID:1585798
MD5:d7ae3392a9ce8d10923040dd4c3ef0af
SHA1:37c5b3cf8831a841c5ed87a4129595c8a721302e
SHA256:dbac017142912cc3bef0a236b80857511776be8119f7abd64253cccd23ebd6e4
Tags:exeuser-abuse_ch
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Yara detected aPLib compressed binary
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wRhEMj1swo.exe (PID: 5932 cmdline: "C:\Users\user\Desktop\wRhEMj1swo.exe" MD5: D7AE3392A9CE8D10923040DD4C3EF0AF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
wRhEMj1swo.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\update.exeCN_Honker_WordpressScannerSample from CN Honker Pentest Toolset - file WordpressScanner.exeFlorian Roth
    • 0xd571c:$s0: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    • 0xe8368:$s1: (http://www.eyuyan.com)
    • 0xcbd6c:$s2: GetConnectString
    • 0xe2cd4:$s4: #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_CHS)
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000000.1716850322.00000000006F0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Process Memory Space: wRhEMj1swo.exe PID: 5932JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.wRhEMj1swo.exe.742ca5.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.wRhEMj1swo.exe.742ca5.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.wRhEMj1swo.exe.70cec9.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                0.0.wRhEMj1swo.exe.70cec9.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  0.2.wRhEMj1swo.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-08T09:41:05.555259+010020283713Unknown Traffic192.168.2.449730103.235.46.96443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\Desktop\update.exeReversingLabs: Detection: 36%
                    Source: wRhEMj1swo.exeReversingLabs: Detection: 54%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\Desktop\update.exeJoe Sandbox ML: detected
                    Source: wRhEMj1swo.exeJoe Sandbox ML: detected
                    Source: wRhEMj1swo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 103.235.46.96:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: Joe Sandbox ViewIP Address: 103.235.46.96 103.235.46.96
                    Source: Joe Sandbox ViewIP Address: 103.235.46.96 103.235.46.96
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 103.235.46.96:443
                    Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveAccept: text/html, application/xhtml+xml, */*Accept-Encoding: identityAccept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Host: www.baidu.com
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: www.baidu.com
                    Source: update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/GX_RZ.txt
                    Source: wRhEMj1swo.exeString found in binary or memory: http://47.92.98.180:88/MQNT/MQNT.exe
                    Source: wRhEMj1swo.exe, update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/data.txt
                    Source: wRhEMj1swo.exeString found in binary or memory: http://ip-api.com/json/?lang=zh-CN
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q1.qlogo.cn/g?b=qq&nk=
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=100
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=1007451f2903af691535062ed068339ac36
                    Source: wRhEMj1swo.exeString found in binary or memory: http://whois.pconline.com.cn/ipJson.jsp?json=true
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.eyuyan.com
                    Source: wRhEMj1swo.exe, update.exe.0.drString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.eyuyan.comservice
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ibsensoftware.com/
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ip138.com
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ip138.comUser-Agent:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: wRhEMj1swo.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/h
                    Source: wRhEMj1swo.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=
                    Source: wRhEMj1swo.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=content-type:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://ip.cn/api/index?ip=&type=0
                    Source: wRhEMj1swo.exeString found in binary or memory: https://ipinfo.io/json
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.baidu.com
                    Source: wRhEMj1swo.exe, 00000000.00000003.1736612849.0000000000A89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.baidu.comDate:KB3140245/
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.uc.cn/ip
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 103.235.46.96:443 -> 192.168.2.4:49730 version: TLS 1.2

                    System Summary

                    barindex
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe Author: Florian Roth
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004119E8: CreateFileA,DeviceIoControl,CloseHandle,0_2_004119E8
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004175E60_2_004175E6
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0047677F0_2_0047677F
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: String function: 00401111 appears 85 times
                    Source: wRhEMj1swo.exe, 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exe, 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: CN_Honker_WordpressScanner date = 2015-06-23, author = Florian Roth, description = Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, score = 0b3c5015ba3616cbc616fc9ba805fea73e98bc83, reference = Disclosed CN Honker Pentest Toolset, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: classification engineClassification label: mal80.evad.winEXE@1/3@1/1
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_00401BFE CreateToolhelp32Snapshot,Module32First,0_2_00401BFE
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile created: C:\Users\user\Desktop\update.exeJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeMutant created: \Sessions\1\BaseNamedObjects\NULL
                    Source: wRhEMj1swo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: wRhEMj1swo.exeReversingLabs: Detection: 54%
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: avifil32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile written: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeAutomated click: OK
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeAutomated click: OK
                    Source: wRhEMj1swo.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: wRhEMj1swo.exeStatic file information: File size 5660160 > 1048576
                    Source: wRhEMj1swo.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x205c00
                    Source: wRhEMj1swo.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x32e200

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: wRhEMj1swo.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.742ca5.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.742ca5.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.70cec9.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.70cec9.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.1716850322.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: wRhEMj1swo.exe PID: 5932, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005E4C20 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005E4C20
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005DB148 push eax; ret 0_2_005DB166
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005D8C50 push eax; ret 0_2_005D8C7E
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile created: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeDropped PE file which has not been started: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exe TID: 3244Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: wRhEMj1swo.exe, 00000000.00000003.1736612849.0000000000AA1000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.1800223111.0000000000AA1000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.1774306071.0000000000AA1000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000002.1801411579.00000000009FE000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000002.1801509032.0000000000AA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005E4C20 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005E4C20
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0044086C mov ebx, dword ptr fs:[00000030h]0_2_0044086C
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004222F3 mov ebx, dword ptr fs:[00000030h]0_2_004222F3
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0047FB4C mov ebx, dword ptr fs:[00000030h]0_2_0047FB4C
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_00421EEC mov ebx, dword ptr fs:[00000030h]0_2_00421EEC
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0043E797 mov ebx, dword ptr fs:[00000030h]0_2_0043E797
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004706E8 HeapAlloc,RtlFreeHeap,GetProcessHeap,HeapReAlloc,0_2_004706E8
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004200FF cpuid 0_2_004200FF
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005DD4AC GetVersionExA,GetEnvironmentVariableA,GetModuleFileNameA,0_2_005DD4AC
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    OS Credential Dumping1
                    Query Registry
                    Remote Services1
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                    Virtualization/Sandbox Evasion
                    LSASS Memory121
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager2
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive12
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    wRhEMj1swo.exe54%ReversingLabsWin32.Trojan.Generic
                    wRhEMj1swo.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\Desktop\update.exe100%Joe Sandbox ML
                    C:\Users\user\Desktop\update.exe37%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.ip138.comUser-Agent:0%Avira URL Cloudsafe
                    https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/MQNT.exe0%Avira URL Cloudsafe
                    http://www.eyuyan.com0%Avira URL Cloudsafe
                    http://www.eyuyan.comservice0%Avira URL Cloudsafe
                    https://www.uc.cn/ip0%Avira URL Cloudsafe
                    https://www.baidu.comDate:KB3140245/0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/data.txt0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/GX_RZ.txt0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    www.wshifen.com
                    103.235.46.96
                    truefalse
                      high
                      www.baidu.com
                      unknown
                      unknownfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.eyuyan.com)DVarFileInfo$wRhEMj1swo.exe, update.exe.0.drfalse
                          high
                          https://api.ip.sb/ipwRhEMj1swo.exefalse
                            high
                            http://whois.pconline.com.cn/ipJson.jsp?json=truewRhEMj1swo.exefalse
                              high
                              http://www.ip138.comUser-Agent:wRhEMj1swo.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://club.vip.qq.com/api/aggregation?g_tk=content-type:wRhEMj1swo.exefalse
                                high
                                http://www.ibsensoftware.com/wRhEMj1swo.exefalse
                                  high
                                  https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:wRhEMj1swo.exefalse
                                    high
                                    https://ip.cn/api/index?ip=&type=0wRhEMj1swo.exefalse
                                      high
                                      https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonipwRhEMj1swo.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.eyuyan.comwRhEMj1swo.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ip-api.com/json/?lang=zh-CNwRhEMj1swo.exefalse
                                        high
                                        http://q1.qlogo.cn/g?b=qq&nk=wRhEMj1swo.exefalse
                                          high
                                          http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=100wRhEMj1swo.exefalse
                                            high
                                            https://www.baidu.comwRhEMj1swo.exefalse
                                              high
                                              http://47.92.98.180:88/MQNT/GX_RZ.txtupdate.exe.0.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://club.vip.qq.com/api/aggregation?g_tk=wRhEMj1swo.exefalse
                                                high
                                                http://www.eyuyan.comservicewRhEMj1swo.exefalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=1007451f2903af691535062ed068339ac36wRhEMj1swo.exefalse
                                                  high
                                                  https://cdid.c-ctrip.com/model-poc2/hwRhEMj1swo.exefalse
                                                    high
                                                    https://ipinfo.io/jsonwRhEMj1swo.exefalse
                                                      high
                                                      https://www.baidu.comDate:KB3140245/wRhEMj1swo.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://47.92.98.180:88/MQNT/MQNT.exewRhEMj1swo.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://47.92.98.180:88/MQNT/data.txtwRhEMj1swo.exe, update.exe.0.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.uc.cn/ipwRhEMj1swo.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.ip138.comwRhEMj1swo.exefalse
                                                        high
                                                        https://www.baidu.com/wRhEMj1swo.exe, 00000000.00000003.1736612849.0000000000A89000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          103.235.46.96
                                                          www.wshifen.comHong Kong
                                                          55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1585798
                                                          Start date and time:2025-01-08 09:40:07 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 20s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:6
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:wRhEMj1swo.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:d7ae3392a9ce8d10923040dd4c3ef0af.exe
                                                          Detection:MAL
                                                          Classification:mal80.evad.winEXE@1/3@1/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:Failed
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.190.159.64, 20.109.210.53, 2.23.227.208, 13.107.246.45
                                                          • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          TimeTypeDescription
                                                          03:41:05API Interceptor1x Sleep call for process: wRhEMj1swo.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          103.235.46.96VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/s?wd=www.cfjuzi.com&rsv_spt=1&issp=1&rsv_bp=0&ie=utf-8&tn=utf8speed_dg&inputT=453
                                                          New Al Maktoum International Airport Enquiry Ref #2401249.exeGet hashmaliciousFormBookBrowse
                                                          • www.wvufcw948o.top/pt46/?ara=runx2q514acjuuceA0OTyKdTIzcy0YcAOvUMICEfyLgC3vUfTcW2aWKxfLyo5+IB4FDn&D8V=_FNDAz
                                                          4.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          2.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          1.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          3.exeGet hashmaliciousBlackMoon, XRedBrowse
                                                          • www.baidu.com/
                                                          1.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          f1.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          www.wshifen.comU02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                          • 103.235.47.188
                                                          2024-12-10#U67e5#U9605_uninst.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          2024-12-10#U67e5#U9605_uninst.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 103.235.47.188
                                                          b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 103.235.47.188
                                                          VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                          • 103.235.46.96
                                                          360safe.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.47.188
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdU02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          db0fa4b8db0333367e9bda3ab68b8042.m68k.elfGet hashmaliciousMirai, GafgytBrowse
                                                          • 106.13.224.246
                                                          arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 119.75.215.154
                                                          nsharm7.elfGet hashmaliciousMiraiBrowse
                                                          • 182.61.224.140
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 182.61.224.138
                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                          • 103.235.47.188
                                                          elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 180.76.189.193
                                                          2024-12-10#U67e5#U9605_uninst.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          a0e9f5d64349fb13191bc781f81f42e1[UPD]Intel_Unit.2.1.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          socolo.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                          • 103.235.46.96
                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          setup.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          'Set-up.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          SET_UP.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          Set-UpFile_v25.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.46.96
                                                          LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          No context
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):432
                                                          Entropy (8bit):4.001798566475806
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmWvclLwv2R9G4wmDg86uCEuyLyn:QCGwv4o0BlLw+rTV6uuyW
                                                          MD5:2FC4766F11242121D9AE2116FF5E663D
                                                          SHA1:8109000AC241302981D42F11FFEE04E3C61FCD93
                                                          SHA-256:EC5937989CD48D8BCDBF562C52BC3903FB135491E98C89B1AA88996E7BD008E6
                                                          SHA-512:650EDD5B580926CD743E5D8186B2CD5EB8B3070126575DB304C1B809F1AA4841E0316A6D4701EC3B730025F0161EDE1CAD041DA10C575830185804D99298664A
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.o.c.u.m.e.n.t.s.\.1.9.C.A.D.7.2.1.B.5.9.B.0.9.B.2.0.8.B.5.A.7.E.2.F.6.3.8.7.8.4.3...i.c.o.....I.n.f.o.T.i.p.=.P.i.k.a.c.h.u.N.T............. ............. .................Q.Q.........................
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):954368
                                                          Entropy (8bit):6.344965617584001
                                                          Encrypted:false
                                                          SSDEEP:24576:YvtI2D6CEhvugYa3EZfup4jflORg0RBQI:YevLEZ7cRg0RJ
                                                          MD5:8A619EBB79546DD4487F312B9C57934F
                                                          SHA1:6986759E032DB2694D625C85EC5C8B4AD74A689B
                                                          SHA-256:0C274B149400E89EBC0F6335A9181005B4249CABEFA8EC8B47C1D56710B2D3EF
                                                          SHA-512:AB29923B35AA1D21813F9D6B012979385F7C4B161FEE51C28A4987768B93297C81E88EAA969B9F491F0A359FD18F3515CC19C694ABD95413A575053C5BA29C7B
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: CN_Honker_WordpressScanner, Description: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, Source: C:\Users\user\Desktop\update.exe, Author: Florian Roth
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 37%
                                                          Reputation:low
                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......p.-.4.C.4.C.4.C.[.H.=.C.[.I.2.C...M...C.O.O.1.C.b.P...C.V.P.(.C.4.B...C.....7.C...H.E.C...I..C..H.W.C..I./.C.4.C.m.C..E.5.C.Rich4.C.........................PE..L.....|g.........................................@..........................................................................Q..,....0...e..............................................................................0............................text...n........................... ..`.rdata.............................@..@.data...j...........................@....rsrc....e...0...p... ..............@..@................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
                                                          Category:dropped
                                                          Size (bytes):67646
                                                          Entropy (8bit):5.7039139970238075
                                                          Encrypted:false
                                                          SSDEEP:1536:vrpcQaRJlr5a3QEC2ADfYVmqpPZf++r7MJsEzlDtr66Evbag:vrpcQaGHVmOhf++razdtYp
                                                          MD5:19CAD721B59B09B208B5A7E2F6387843
                                                          SHA1:7AB6F085A11E86D5514E182BF0DF1C96723C8901
                                                          SHA-256:F9DFF22EF297227202F34343DA1BA9585F843B3AA0834B1074F273C9D9542252
                                                          SHA-512:E6DB461CB85A7B4C9F44019678E49562B68B820FFF6F0EE82A7533F710858C7AA7DF72FE57E4FE0A6A8291C33AAD819C5DCD7B75F9A55CFF12AF12344A555E81
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:............ .(.......(............. .................................................200.............................................. ...! ..! ..! ..$!..$!..$"..%#..&#..&#..'$..'$..(%.!(%.&+).),*.,-+.,-+.),*.*-+.,-+.-.,.+.,.+.,.-.,.-.,.-.,.,-+.*,,.(-,.(-,.'-,.'-,.'-,.&.-.'/..)/..)/..+32.+32.-32.-32.+33.+33.-32.-32..43..43..31..31..31..31..31./42.-41.+2/.*/-.+0..+2/.+2/.-0..).,.(-+.'.+.'.+.'.+.(-+.'.+.(/,.&/,.(/,.(/,.(/,.(/,.(/,.(/,.(/,.&/,.#,).!,). +(..*'..(%..'$..%"..%"..&$..&$..$#..#"..#".."!.." .." .........................................PRR.............................................#%&.............................................. ..!!..!!..#!..$"..&$..%#..'$..&$..(%..'%..(&..(&..)'.!,*.$,+.%-,.%-,.%-,.%-,.&.-.'/..'20.(31.*21.*21.*21.+32.)33.)33.*44.(44.)55.)55.)55.)55.*66.+77.)55.)55.)55.)55.)55.)55.)55.)55.-77.-86.-86.-86.-86.-86.-86.-86.,75.+64.)42.(31.+64.+64.+32.(31.)42.'42.'42.'42.'42.'42.'42.&42.#0..#0..#0.."/-."/-.!.,.!.,.!.,..-+...+..,*..,)..*(..)&..'%..&$..%#..%$..$
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.061578692374249
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.26%
                                                          • UPX compressed Win32 Executable (30571/9) 0.30%
                                                          • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                          • Windows Screen Saver (13104/52) 0.13%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          File name:wRhEMj1swo.exe
                                                          File size:5'660'160 bytes
                                                          MD5:d7ae3392a9ce8d10923040dd4c3ef0af
                                                          SHA1:37c5b3cf8831a841c5ed87a4129595c8a721302e
                                                          SHA256:dbac017142912cc3bef0a236b80857511776be8119f7abd64253cccd23ebd6e4
                                                          SHA512:731bee53652b0f6190ff9df76417f7f30193c939f635b023bf58a464ee2428535daf153e937fd591aa94d06999dd3db7fa86c3daf211b65416ab9d0046b1bf8e
                                                          SSDEEP:98304:HdxNmK4FEV5TEZ7ce0Rg52Pw8B4DgXUtJBAUZLn:HtaV0RgYPxoKWJV7
                                                          TLSH:B346BF23F042C0B2D5261AF032B6573CA9759FA11A35C983EBE4FEB5ED33162979510E
                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........D.}ID.}ID.}I+.vIM.}I+.wIB.}I?.qIA.}I..nIh.}I.. IF.}I..sIh.}ID.|I..}I&.nI[.}IM..IE.}I..oIN.}Ir.vI..}Ir.wI..}I..vI*.}I..wIt.}
                                                          Icon Hash:2731d28aae6e218f
                                                          Entrypoint:0x5d7650
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:
                                                          Time Stamp:0x677CD3FB [Tue Jan 7 07:12:59 2025 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:1841bc7befa66af3a16d317711e55a7e
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          push FFFFFFFFh
                                                          push 00860868h
                                                          push 005DA5B4h
                                                          mov eax, dword ptr fs:[00000000h]
                                                          push eax
                                                          mov dword ptr fs:[00000000h], esp
                                                          sub esp, 58h
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          mov dword ptr [ebp-18h], esp
                                                          call dword ptr [006071C8h]
                                                          xor edx, edx
                                                          mov dl, ah
                                                          mov dword ptr [009BC1D4h], edx
                                                          mov ecx, eax
                                                          and ecx, 000000FFh
                                                          mov dword ptr [009BC1D0h], ecx
                                                          shl ecx, 08h
                                                          add ecx, edx
                                                          mov dword ptr [009BC1CCh], ecx
                                                          shr eax, 10h
                                                          mov dword ptr [009BC1C8h], eax
                                                          push 00000001h
                                                          call 00007F5124F01D2Bh
                                                          pop ecx
                                                          test eax, eax
                                                          jne 00007F5124EFBDEAh
                                                          push 0000001Ch
                                                          call 00007F5124EFBEA8h
                                                          pop ecx
                                                          call 00007F5124F01AD6h
                                                          test eax, eax
                                                          jne 00007F5124EFBDEAh
                                                          push 00000010h
                                                          call 00007F5124EFBE97h
                                                          pop ecx
                                                          xor esi, esi
                                                          mov dword ptr [ebp-04h], esi
                                                          call 00007F5124F01904h
                                                          call dword ptr [006073F0h]
                                                          mov dword ptr [009C1444h], eax
                                                          call 00007F5124F017C2h
                                                          mov dword ptr [009BC140h], eax
                                                          call 00007F5124F0156Bh
                                                          call 00007F5124F014ADh
                                                          call 00007F5124EFF35Eh
                                                          mov dword ptr [ebp-30h], esi
                                                          lea eax, dword ptr [ebp-5Ch]
                                                          push eax
                                                          call dword ptr [00607260h]
                                                          call 00007F5124F0143Eh
                                                          mov dword ptr [ebp-64h], eax
                                                          test byte ptr [ebp-30h], 00000001h
                                                          je 00007F5124EFBDE8h
                                                          movzx eax, word ptr [ebp+00h]
                                                          Programming Language:
                                                          • [ASM] VS2008 SP1 build 30729
                                                          • [C++] VS98 (6.0) SP6 build 8804
                                                          • [ C ] VS98 (6.0) SP6 build 8804
                                                          • [C++] VS98 (6.0) build 8168
                                                          • [ C ] VS98 (6.0) build 8168
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5327380x168.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c20000x791c.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x2070000x80c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x205b5e0x205c0050aeeeb9ec9474888a2b10d9199f7d4bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x2070000x32e0c00x32e2001a465cc638bc8f7704c968afb5dde86dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x5360000x8b44a0x2a2000c1683502fdca9c65eabe46d3c312c96False0.3508844120919881data5.9722288998144375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x5c20000x791c0x7a00b0d5482a2c2286e7ebd7b631f9302e7dFalse0.44041367827868855data5.292361705762094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          TEXTINCLUDE0x5c2d9c0xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                                          TEXTINCLUDE0x5c2da80x16dataChineseChina1.3636363636363635
                                                          TEXTINCLUDE0x5c2dc00x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                                          WAVE0x5c2f140x1448RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 22050 HzChineseChina0.8330123266563945
                                                          RT_CURSOR0x5c435c0x134dataChineseChina0.5811688311688312
                                                          RT_CURSOR0x5c44900x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                                          RT_CURSOR0x5c45c40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                                          RT_CURSOR0x5c46f80xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                                          RT_CURSOR0x5c47ac0x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\370\017\377\377\374\037\377\377\376?\377\377\377\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.32792207792207795
                                                          RT_CURSOR0x5c48e00x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.3246753246753247
                                                          RT_BITMAP0x5c4a140x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                                                          RT_BITMAP0x5c4b800x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                                          RT_BITMAP0x5c4dc80x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                                          RT_BITMAP0x5c4f0c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                                          RT_BITMAP0x5c50640x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                                          RT_BITMAP0x5c51bc0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                                          RT_BITMAP0x5c53140x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                                          RT_BITMAP0x5c546c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                                          RT_BITMAP0x5c55c40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                                          RT_BITMAP0x5c571c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                                          RT_BITMAP0x5c58740x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                                          RT_BITMAP0x5c59cc0x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                                          RT_BITMAP0x5c5fb00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                                          RT_BITMAP0x5c60680x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                                          RT_BITMAP0x5c61d40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                                          RT_ICON0x5c63180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                          RT_ICON0x5c66000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                          RT_ICON0x5c67280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.5215759849906192
                                                          RT_MENU0x5c77d00xcdataChineseChina1.5
                                                          RT_MENU0x5c77dc0x284dataChineseChina0.5
                                                          RT_DIALOG0x5c7a600x98dataChineseChina0.7171052631578947
                                                          RT_DIALOG0x5c7af80x17adataChineseChina0.5185185185185185
                                                          RT_DIALOG0x5c7c740xfadataChineseChina0.696
                                                          RT_DIALOG0x5c7d700xeadataChineseChina0.6239316239316239
                                                          RT_DIALOG0x5c7e5c0x8aedataChineseChina0.39603960396039606
                                                          RT_DIALOG0x5c870c0xb2dataChineseChina0.7359550561797753
                                                          RT_DIALOG0x5c87c00xccdataChineseChina0.7647058823529411
                                                          RT_DIALOG0x5c888c0xb2dataChineseChina0.6629213483146067
                                                          RT_DIALOG0x5c89400xe2dataChineseChina0.6637168141592921
                                                          RT_DIALOG0x5c8a240x18cdataChineseChina0.5227272727272727
                                                          RT_STRING0x5c8bb00x50dataChineseChina0.85
                                                          RT_STRING0x5c8c000x2cdataChineseChina0.5909090909090909
                                                          RT_STRING0x5c8c2c0x78dataChineseChina0.925
                                                          RT_STRING0x5c8ca40x1c4dataChineseChina0.8141592920353983
                                                          RT_STRING0x5c8e680x12adataChineseChina0.5201342281879194
                                                          RT_STRING0x5c8f940x146dataChineseChina0.6288343558282209
                                                          RT_STRING0x5c90dc0x40dataChineseChina0.65625
                                                          RT_STRING0x5c911c0x64dataChineseChina0.73
                                                          RT_STRING0x5c91800x1d8dataChineseChina0.6758474576271186
                                                          RT_STRING0x5c93580x114dataChineseChina0.6376811594202898
                                                          RT_STRING0x5c946c0x24dataChineseChina0.4444444444444444
                                                          RT_GROUP_CURSOR0x5c94900x14dataChineseChina1.4
                                                          RT_GROUP_CURSOR0x5c94a40x14dataChineseChina1.4
                                                          RT_GROUP_CURSOR0x5c94b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                          RT_GROUP_CURSOR0x5c94cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                          RT_GROUP_CURSOR0x5c94e00x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                                          RT_GROUP_ICON0x5c95040x14data1.2
                                                          RT_GROUP_ICON0x5c95180x14dataChineseChina1.2
                                                          RT_GROUP_ICON0x5c952c0x14dataChineseChina1.25
                                                          RT_VERSION0x5c95400x20cdataChineseChina0.5534351145038168
                                                          RT_MANIFEST0x5c974c0x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                                          DLLImport
                                                          MSVFW32.dllDrawDibDraw
                                                          AVIFIL32.dllAVIStreamGetFrame, AVIStreamInfoA
                                                          iphlpapi.dllGetAdaptersInfo
                                                          WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, PlaySoundA
                                                          WS2_32.dllinet_ntoa, WSAStartup, WSACleanup, select, send, closesocket, WSAAsyncSelect, recvfrom, ioctlsocket, recv, getpeername, accept, ntohl
                                                          RASAPI32.dllRasGetConnectStatusA, RasHangUpA
                                                          KERNEL32.dllGetVersion, FileTimeToSystemTime, TerminateThread, VirtualAlloc, VirtualFree, CreateMutexA, ReleaseMutex, SuspendThread, InterlockedIncrement, InterlockedDecrement, LocalFree, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, lstrcmpiA, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, TlsAlloc, GlobalHandle, TlsFree, TlsSetValue, LocalReAlloc, TlsGetValue, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, GetACP, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetLastError, GetSystemDirectoryA, GetWindowsDirectoryA, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, MoveFileA, DeleteFileA, CopyFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, SetLocalTime, GetCommandLineA, GetTickCount, WaitForSingleObject, CloseHandle, InterlockedExchange, GetTimeZoneInformation
                                                          USER32.dllGetSysColorBrush, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, RegisterClassA, GetMenuItemCount, GetMenuItemID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, EndDialog, CreateDialogIndirectParamA, DestroyWindow, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, SetWindowTextA, GetForegroundWindow, UnregisterHotKey, RegisterHotKey, CreateWindowExA, CallWindowProcA, GetWindowTextA, GetDlgItem, GetClassNameA, GetDesktopWindow, DrawStateA, FrameRect, GetNextDlgTabItem, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, LoadStringA, CreateIconFromResource, IntersectRect, UnregisterClassA
                                                          GDI32.dllCreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreatePatternBrush, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, TranslateCharsetInfo, SaveDC, RestoreDC, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, CreateFontIndirectA, ExtSelectClipRgn, GetViewportExtEx, PtVisible, RectVisible, ExtTextOutA, Escape, GetTextMetricsA, SetDIBitsToDevice, SetTextColor, SetBkMode, TextOutA, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, CreateFontA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, GetTextExtentPoint32A, LineTo, SetPolyFillMode, GetDeviceCaps
                                                          WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                          comdlg32.dllChooseColorA, ChooseFontA, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
                                                          ADVAPI32.dllRegCreateKeyExA, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegCloseKey
                                                          SHELL32.dllDragAcceptFiles, DragQueryFileA, ShellExecuteA, Shell_NotifyIconA, SHGetSpecialFolderPathA, DragFinish
                                                          ole32.dllCLSIDFromProgID, OleInitialize, CLSIDFromString, CoCreateInstance, OleRun, OleUninitialize
                                                          OLEAUT32.dllVariantChangeType, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetDim, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantClear, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, UnRegisterTypeLib, VariantInit
                                                          COMCTL32.dllImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_Destroy, ImageList_Create, ImageList_BeginDrag, ImageList_DragShowNolock, _TrackMouseEvent, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_EndDrag, ImageList_Read, ImageList_Duplicate, ImageList_Add
                                                          WININET.dllInternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetConnectA, InternetSetOptionA, InternetOpenA, InternetCloseHandle, InternetCanonicalizeUrlA
                                                          Language of compilation systemCountry where language is spokenMap
                                                          ChineseChina
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-08T09:41:05.555259+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730103.235.46.96443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 09:41:04.323394060 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:04.323431015 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:04.323549032 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:04.350248098 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:04.350264072 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.555145025 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.555258989 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:05.555285931 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.555339098 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:05.558995008 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:05.559001923 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.559232950 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.608397007 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:05.675046921 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:05.719326973 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.997812033 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.997873068 CET44349730103.235.46.96192.168.2.4
                                                          Jan 8, 2025 09:41:05.997984886 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:06.016196966 CET49730443192.168.2.4103.235.46.96
                                                          Jan 8, 2025 09:41:06.016218901 CET44349730103.235.46.96192.168.2.4
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 09:41:04.311626911 CET4972453192.168.2.41.1.1.1
                                                          Jan 8, 2025 09:41:04.318355083 CET53497241.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 8, 2025 09:41:04.311626911 CET192.168.2.41.1.1.10xb855Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 8, 2025 09:41:04.318355083 CET1.1.1.1192.168.2.40xb855No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 8, 2025 09:41:04.318355083 CET1.1.1.1192.168.2.40xb855No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 8, 2025 09:41:04.318355083 CET1.1.1.1192.168.2.40xb855No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                                                          Jan 8, 2025 09:41:04.318355083 CET1.1.1.1192.168.2.40xb855No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449730103.235.46.964435932C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-08 08:41:05 UTC271OUTHEAD / HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Connection: Keep-Alive
                                                          Accept: text/html, application/xhtml+xml, */*
                                                          Accept-Encoding: identity
                                                          Accept-Language: zh-cn
                                                          User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
                                                          Host: www.baidu.com
                                                          2025-01-08 08:41:05 UTC327INHTTP/1.1 200 OK
                                                          Accept-Ranges: bytes
                                                          Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
                                                          Content-Length: 277
                                                          Content-Type: text/html
                                                          Date: Wed, 08 Jan 2025 08:41:05 GMT
                                                          Etag: "575e1f6f-115"
                                                          Last-Modified: Mon, 13 Jun 2016 02:50:23 GMT
                                                          Pragma: no-cache
                                                          Server: bfe/1.0.8.18
                                                          Connection: close


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:03:41:03
                                                          Start date:08/01/2025
                                                          Path:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\wRhEMj1swo.exe"
                                                          Imagebase:0x400000
                                                          File size:5'660'160 bytes
                                                          MD5 hash:D7AE3392A9CE8D10923040DD4C3EF0AF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.1716850322.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:3.1%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0.5%
                                                            Total number of Nodes:191
                                                            Total number of Limit Nodes:16
                                                            execution_graph 61846 5da5b4 RtlUnwind 61600 5d8f57 61603 5d8f69 61600->61603 61604 5d8f66 61603->61604 61606 5d8f70 61603->61606 61606->61604 61607 5d8f95 61606->61607 61608 5d8fc2 61607->61608 61609 5d9005 61607->61609 61610 5d8ff0 61608->61610 61625 5dfcb4 29 API calls 61608->61625 61609->61610 61615 5d9027 61609->61615 61613 5d9074 RtlAllocateHeap 61610->61613 61614 5d8ff7 61610->61614 61612 5d8fd8 61626 5e1221 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 61612->61626 61613->61614 61614->61606 61628 5dfcb4 29 API calls 61615->61628 61618 5d8fe3 61627 5d8ffc LeaveCriticalSection 61618->61627 61619 5d902e 61629 5e1cc4 6 API calls 61619->61629 61622 5d9041 61630 5d905b LeaveCriticalSection 61622->61630 61624 5d904e 61624->61610 61624->61614 61625->61612 61626->61618 61627->61610 61628->61619 61629->61622 61630->61624 61631 5d9e16 61641 5d9e4b 61631->61641 61632 5d9f31 61634 5d9f03 RtlAllocateHeap 61634->61641 61640 5d9ec5 61640->61634 61640->61641 61645 5dfcb4 29 API calls 61640->61645 61646 5e1cc4 6 API calls 61640->61646 61647 5d9f38 LeaveCriticalSection 61640->61647 61641->61632 61641->61634 61641->61640 61642 5dfcb4 29 API calls 61641->61642 61643 5e1221 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 61641->61643 61644 5d9eaf LeaveCriticalSection 61641->61644 61642->61641 61643->61641 61644->61641 61645->61640 61646->61640 61647->61640 61841 5dacb1 32 API calls 61648 5d7650 GetVersion 61680 5dd5f4 HeapCreate 61648->61680 61650 5d76ae 61651 5d76bb 61650->61651 61652 5d76b3 61650->61652 61692 5dd3b1 37 API calls 61651->61692 61700 5d777d 8 API calls 61652->61700 61656 5d76c0 61657 5d76cc 61656->61657 61658 5d76c4 61656->61658 61693 5dd1f5 34 API calls 61657->61693 61701 5d777d 8 API calls 61658->61701 61662 5d76d6 GetCommandLineA 61694 5dd0c3 37 API calls 61662->61694 61664 5d76e6 61702 5dce76 49 API calls 61664->61702 61666 5d76f0 61695 5dcdbd 48 API calls 61666->61695 61668 5d76f5 61669 5d76fa GetStartupInfoA 61668->61669 61696 5dcd65 48 API calls 61669->61696 61671 5d770c 61672 5d7715 61671->61672 61673 5d771e GetModuleHandleA 61672->61673 61697 5f29ed 61673->61697 61677 5d7739 61704 5dcbed 36 API calls 61677->61704 61679 5d774a 61681 5dd64a 61680->61681 61682 5dd614 61680->61682 61681->61650 61705 5dd4ac 57 API calls 61682->61705 61684 5dd619 61685 5dd630 61684->61685 61686 5dd623 61684->61686 61688 5dd64d 61685->61688 61707 5e19cc HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 61685->61707 61706 5e0e85 HeapAlloc 61686->61706 61688->61650 61689 5dd62d 61689->61688 61691 5dd63e HeapDestroy 61689->61691 61691->61681 61692->61656 61693->61662 61694->61664 61695->61668 61696->61671 61708 5fbaa4 61697->61708 61702->61666 61703 5daca0 32 API calls 61703->61677 61704->61679 61705->61684 61706->61689 61707->61689 61719 5fa805 61708->61719 61716 5d7730 61716->61703 61717 5fbaeb 61747 600bc2 68 API calls 61717->61747 61748 5ff4a6 61719->61748 61722 5fa816 61724 5ff480 61722->61724 61723 5ff480 65 API calls 61723->61722 61725 5ffa08 65 API calls 61724->61725 61726 5ff48f 61725->61726 61727 5fbab6 61726->61727 61777 5ffa9d 61726->61777 61729 600303 SetErrorMode SetErrorMode 61727->61729 61730 5ff480 65 API calls 61729->61730 61731 60031a 61730->61731 61732 5ff480 65 API calls 61731->61732 61733 600329 61732->61733 61734 60034f 61733->61734 61785 600366 61733->61785 61736 5ff480 65 API calls 61734->61736 61738 600354 61736->61738 61737 5fbace 61737->61717 61740 5f5907 61737->61740 61738->61737 61804 5fa81a 61738->61804 61741 5f5913 61740->61741 61742 5f591c 61740->61742 61741->61717 61744 5f5924 61742->61744 61745 5f5963 61742->61745 61828 5d7538 61744->61828 61835 5f57db 29 API calls 61745->61835 61747->61716 61749 5ff480 65 API calls 61748->61749 61750 5ff4ab 61749->61750 61753 5ffa08 61750->61753 61754 5ffa3e TlsGetValue 61753->61754 61755 5ffa11 61753->61755 61756 5ffa51 61754->61756 61757 5ffa2b 61755->61757 61774 5ff608 65 API calls 61755->61774 61760 5fa80a 61756->61760 61761 5ffa64 61756->61761 61764 5ff6a1 EnterCriticalSection 61757->61764 61759 5ffa3c 61759->61754 61760->61722 61760->61723 61775 5ff810 65 API calls 61761->61775 61769 5ff6c0 61764->61769 61765 5ff77c 61766 5ff791 LeaveCriticalSection 61765->61766 61766->61759 61767 5ff70d GlobalHandle GlobalUnlock GlobalReAlloc 61770 5ff72f 61767->61770 61768 5ff6fa GlobalAlloc 61768->61770 61769->61765 61769->61767 61769->61768 61771 5ff73d GlobalHandle GlobalLock LeaveCriticalSection 61770->61771 61772 5ff758 GlobalLock 61770->61772 61776 5f32da 65 API calls __EH_prolog 61771->61776 61772->61765 61774->61757 61775->61760 61776->61772 61778 5ffaa7 __EH_prolog 61777->61778 61779 5ffad5 61778->61779 61783 60077f 6 API calls 61778->61783 61779->61727 61781 5ffabe 61784 6007ef LeaveCriticalSection 61781->61784 61783->61781 61784->61779 61786 5ff480 65 API calls 61785->61786 61787 600379 GetModuleFileNameA 61786->61787 61815 5d9647 29 API calls 61787->61815 61789 6003ab 61816 600483 lstrlenA lstrcpynA 61789->61816 61791 6003c7 61792 6003dd 61791->61792 61821 5dbe8d 29 API calls 61791->61821 61794 600417 61792->61794 61817 5fb616 61792->61817 61795 60044a 61794->61795 61796 60042f lstrcpyA 61794->61796 61799 600459 lstrcatA 61795->61799 61800 600477 61795->61800 61823 5dbe8d 29 API calls 61796->61823 61824 5dbe8d 29 API calls 61799->61824 61800->61734 61805 5ff480 65 API calls 61804->61805 61806 5fa81f 61805->61806 61807 5fa877 61806->61807 61825 5ff24e 61806->61825 61807->61737 61810 5ffa9d 7 API calls 61811 5fa855 61810->61811 61812 5fa862 61811->61812 61814 5ff480 65 API calls 61811->61814 61813 5ffa08 65 API calls 61812->61813 61813->61807 61814->61812 61815->61789 61816->61791 61818 5ff480 65 API calls 61817->61818 61819 5fb61c LoadStringA 61818->61819 61820 5fb637 61819->61820 61822 5dbe8d 29 API calls 61820->61822 61821->61792 61822->61794 61823->61795 61824->61800 61826 5ffa08 65 API calls 61825->61826 61827 5fa82b GetCurrentThreadId SetWindowsHookExA 61826->61827 61827->61810 61836 5db148 61828->61836 61830 5d7542 EnterCriticalSection 61831 5d7591 LeaveCriticalSection 61830->61831 61832 5d7560 61830->61832 61831->61741 61837 5f52c4 29 API calls 61832->61837 61834 5d7572 61834->61831 61834->61834 61835->61741 61836->61830 61837->61834 61850 5fab72 66 API calls 61577 5d8e6e 61578 5d8e9c 61577->61578 61579 5d8f48 61577->61579 61580 5d8ea6 61578->61580 61581 5d8ee1 61578->61581 61594 5dfcb4 29 API calls 61580->61594 61593 5d8ed2 61581->61593 61597 5dfcb4 29 API calls 61581->61597 61584 5d8f3a RtlFreeHeap 61584->61579 61585 5d8ec7 61596 5d8ed8 LeaveCriticalSection 61585->61596 61586 5d8ead 61586->61585 61595 5e0ef8 VirtualFree VirtualFree HeapFree 61586->61595 61587 5d8eed 61588 5d8f19 61587->61588 61598 5e1c7f VirtualFree HeapFree VirtualFree 61587->61598 61599 5d8f30 LeaveCriticalSection 61588->61599 61593->61579 61593->61584 61594->61586 61595->61585 61596->61593 61597->61587 61598->61588 61599->61593 61845 5fed89 65 API calls __EH_prolog 61847 42165a GetPEB GetPEB 61851 434798 GetPEB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2095 401bfe-401cd5 call 52e3d0 * 4 call 4021f2 call 52e3e2 2108 401cd7-401ceb call 52e3dc 2095->2108 2109 401cee-401d0f call 52e3e2 2095->2109 2108->2109 2114 401d11-401d25 call 52e3dc 2109->2114 2115 401d28-401d43 call 52e3e2 2109->2115 2114->2115 2120 401d45-401d59 call 52e3dc 2115->2120 2121 401d5c-401e18 call 52e3d0 call 52e3e2 2115->2121 2120->2121 2128 401e31-401ea7 call 52e3ca 2121->2128 2129 401e1a-401e2e call 52e3dc 2121->2129 2134 401eb8-401ebe 2128->2134 2135 401ea9 2128->2135 2129->2128 2137 401ec0 2134->2137 2138 401ec5-401ef2 call 52e3ca 2134->2138 2136 401eab-401eaf 2135->2136 2139 401eb1-401eb4 2136->2139 2140 401eb6 2136->2140 2137->2138 2143 401f03-401f09 2138->2143 2144 401ef4 2138->2144 2139->2136 2140->2134 2146 401f10-401f28 call 52e3d6 2143->2146 2147 401f0b 2143->2147 2145 401ef6-401efa 2144->2145 2148 401f01 2145->2148 2149 401efc-401eff 2145->2149 2152 401f2b-401f2f 2146->2152 2147->2146 2148->2143 2149->2145 2153 402180-402193 call 52e3e2 2152->2153 2154 401f35-401f46 2152->2154 2163 402195-4021a9 call 52e3dc 2153->2163 2164 4021ac-4021f1 call 52e3d6 * 4 2153->2164 2155 401f9b 2154->2155 2156 401f4c-401f8e 2154->2156 2159 401fa0-401fa2 2155->2159 2156->2155 2158 401f94-401f99 2156->2158 2158->2159 2161 401fa8-401fb9 2159->2161 2162 401fbe-402068 call 52e3d0 call 52e3e2 2159->2162 2161->2153 2175 402081-4020f7 call 52e3ca 2162->2175 2176 40206a-40207e call 52e3dc 2162->2176 2163->2164 2184 402108-40210e 2175->2184 2185 4020f9 2175->2185 2176->2175 2189 402110 2184->2189 2190 402115-402142 call 52e3ca 2184->2190 2187 4020fb-4020ff 2185->2187 2192 402101-402104 2187->2192 2193 402106 2187->2193 2189->2190 2195 402153-402159 2190->2195 2196 402144 2190->2196 2192->2187 2193->2184 2198 402160-40217b call 52e3d6 2195->2198 2199 40215b 2195->2199 2197 402146-40214a 2196->2197 2200 402151 2197->2200 2201 40214c-40214f 2197->2201 2198->2152 2199->2198 2200->2195 2201->2197
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 43e91f5658e9c6bdc4b122ac241575454e0efba38d0e65e7341f6a4c2de222da
                                                            • Instruction ID: cb2145ec05dfb67c699404afd3450a093bca2c7e454c731c957cacca2c279613
                                                            • Opcode Fuzzy Hash: 43e91f5658e9c6bdc4b122ac241575454e0efba38d0e65e7341f6a4c2de222da
                                                            • Instruction Fuzzy Hash: 2D0252B1A402169BFB00DF58ECC179AB7B1FF59324F280475E906AB381D379B951CB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a32d5af4d972bfee726ceb9e89cbc4e1c7d499818ae25d7447f144db315e6365
                                                            • Instruction ID: 95d3b870bcb6fef589d624824f285a6dfde7cca0d58eb0d5bed38eb91d277166
                                                            • Opcode Fuzzy Hash: a32d5af4d972bfee726ceb9e89cbc4e1c7d499818ae25d7447f144db315e6365
                                                            • Instruction Fuzzy Hash: 3C7163B1E40309ABEF10DB949D87BDF7AB8BF14711F140425F604BB2C1E6B66A508B66

                                                            Control-flow Graph

                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(009BBDA0,009BBD74,00000000,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF6B0
                                                            • GlobalAlloc.KERNEL32(00002002,00000000,?,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF705
                                                            • GlobalHandle.KERNEL32(00A02CA8), ref: 005FF70E
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 005FF717
                                                            • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 005FF729
                                                            • GlobalHandle.KERNEL32(00A02CA8), ref: 005FF740
                                                            • GlobalLock.KERNEL32(00000000), ref: 005FF747
                                                            • LeaveCriticalSection.KERNEL32(0w],?,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF74D
                                                            • GlobalLock.KERNEL32(00000000), ref: 005FF75C
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 005FF7A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                            • String ID: 0w]
                                                            • API String ID: 2667261700-2928606970
                                                            • Opcode ID: 14a836d19322825eb98e50977cbab833775139a0b03f3b30fda316f9b2db858e
                                                            • Instruction ID: e4875093aeb34c1d1859b7ac233102ab66a60a198e2d70f333e85c5cf3fdfa25
                                                            • Opcode Fuzzy Hash: 14a836d19322825eb98e50977cbab833775139a0b03f3b30fda316f9b2db858e
                                                            • Instruction Fuzzy Hash: 6E3152756447099FE7249F28DC89A2BBBEAFF44301B01492DF962C3A61E775F9048B50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 410 600303-60032e SetErrorMode * 2 call 5ff480 * 2 415 600330-60034a call 600366 410->415 416 60034f-600359 call 5ff480 410->416 415->416 420 600360-600363 416->420 421 60035b call 5fa81a 416->421 421->420
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000000,00000000,005FBACE,00000000,00000000,00000000,00000000,?,00000000,?,005F2A02,00000000,00000000,00000000,00000000,005D7730), ref: 0060030C
                                                            • SetErrorMode.KERNEL32(00000000,?,00000000,?,005F2A02,00000000,00000000,00000000,00000000,005D7730,00000000), ref: 00600313
                                                              • Part of subcall function 00600366: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 00600397
                                                              • Part of subcall function 00600366: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00600438
                                                              • Part of subcall function 00600366: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 00600465
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                                            • String ID: 0w]
                                                            • API String ID: 3389432936-2928606970
                                                            • Opcode ID: 47e4f9777f6a79a288a2dea7bea5aa65c4acc3ef56cddde84d818b1dead3bc02
                                                            • Instruction ID: 1dc92e5776812a81564c81046c9759732a25e12866b477459d5017e929169995
                                                            • Opcode Fuzzy Hash: 47e4f9777f6a79a288a2dea7bea5aa65c4acc3ef56cddde84d818b1dead3bc02
                                                            • Instruction Fuzzy Hash: 6BF0AF709142158FD719EF24D409B1B7BD5BF88710F05845EF0488B3A2CB74D800CB96

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 804 5dd5f4-5dd612 HeapCreate 805 5dd64a-5dd64c 804->805 806 5dd614-5dd621 call 5dd4ac 804->806 809 5dd630-5dd633 806->809 810 5dd623-5dd62e call 5e0e85 806->810 812 5dd64d-5dd650 809->812 813 5dd635 call 5e19cc 809->813 816 5dd63a-5dd63c 810->816 813->816 816->812 817 5dd63e-5dd644 HeapDestroy 816->817 817->805
                                                            APIs
                                                            • HeapCreate.KERNEL32(00000000,00001000,00000000,005D76AE,00000001), ref: 005DD605
                                                              • Part of subcall function 005DD4AC: GetVersionExA.KERNEL32 ref: 005DD4CB
                                                            • HeapDestroy.KERNEL32 ref: 005DD644
                                                              • Part of subcall function 005E0E85: HeapAlloc.KERNEL32(00000000,00000140,005DD62D,000003F8), ref: 005E0E92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCreateDestroyVersion
                                                            • String ID:
                                                            • API String ID: 2507506473-0
                                                            • Opcode ID: ee9f81f39e98385bde099ac8dc098cacc9890575f16db357e8c92dc1698a566f
                                                            • Instruction ID: f51865484d63e975acad0fd8690db07e25b02cc39a601c185f58abc0afb40669
                                                            • Opcode Fuzzy Hash: ee9f81f39e98385bde099ac8dc098cacc9890575f16db357e8c92dc1698a566f
                                                            • Instruction Fuzzy Hash: 35F06570D59202EADB706B385D46B352DB4BBC0741F140467F545C92E4EAB0C580E972

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 818 5fa81a-5fa823 call 5ff480 821 5fa878 818->821 822 5fa825-5fa850 call 5ff24e GetCurrentThreadId SetWindowsHookExA call 5ffa9d 818->822 826 5fa855-5fa85b 822->826 827 5fa85d-5fa862 call 5ff480 826->827 828 5fa868-5fa877 call 5ffa08 826->828 827->828 828->821
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 005FA82D
                                                            • SetWindowsHookExA.USER32(000000FF,005FAB72,00000000,00000000), ref: 005FA83D
                                                              • Part of subcall function 005FFA9D: __EH_prolog.LIBCMT ref: 005FFAA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentH_prologHookThreadWindows
                                                            • String ID:
                                                            • API String ID: 2183259885-0
                                                            • Opcode ID: 0c2c1aa7fc58c9d56cbeeb8ef714bf320bdc978e384402e41bddc0c42901e30d
                                                            • Instruction ID: f5ed20bf61019511605a88c4788485b709784f6c60d40d311a46a49e7abb285c
                                                            • Opcode Fuzzy Hash: 0c2c1aa7fc58c9d56cbeeb8ef714bf320bdc978e384402e41bddc0c42901e30d
                                                            • Instruction Fuzzy Hash: 87F082719406095AD7302BB0AC0DBBA2E91BF44710F010664F756565E1C6A8AC80C362

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1491 5d9e16-5d9e49 1492 5d9e5f 1491->1492 1493 5d9e4b-5d9e4f 1491->1493 1496 5d9e61-5d9e67 1492->1496 1494 5d9e54-5d9e5d 1493->1494 1495 5d9e51-5d9e53 1493->1495 1494->1496 1495->1494 1497 5d9e6d-5d9e75 1496->1497 1498 5d9f15-5d9f18 1496->1498 1501 5d9eb8-5d9ebb 1497->1501 1502 5d9e77-5d9e80 1497->1502 1499 5d9f1a-5d9f20 1498->1499 1500 5d9f41 1498->1500 1499->1500 1503 5d9f22-5d9f2b call 5e2099 1499->1503 1506 5d9f44-5d9f52 1500->1506 1504 5d9ebd-5d9ec3 1501->1504 1505 5d9efe-5d9f01 1501->1505 1502->1505 1507 5d9e82-5d9ea3 call 5dfcb4 call 5e1221 call 5d9eaf 1502->1507 1503->1496 1515 5d9f31 1503->1515 1504->1505 1509 5d9ec5-5d9eef call 5dfcb4 call 5e1cc4 call 5d9f38 1504->1509 1505->1500 1511 5d9f03-5d9f12 RtlAllocateHeap 1505->1511 1507->1511 1525 5d9ea5-5d9ea8 1507->1525 1509->1511 1527 5d9ef1 1509->1527 1511->1498 1515->1506 1526 5d9ef2-5d9efb call 5db200 1525->1526 1526->1505 1527->1526
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005D9F0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 4a4e00daba088b312a59f1e63b1d627a9e119932e2158916c2e3a2ad72ae283b
                                                            • Instruction ID: 2295377f52eeddbdbb6692e29cfe38e717927bd603d5e5ec95010e135b5468a9
                                                            • Opcode Fuzzy Hash: 4a4e00daba088b312a59f1e63b1d627a9e119932e2158916c2e3a2ad72ae283b
                                                            • Instruction Fuzzy Hash: E6316D72D0426AAACF30EFAC9C8569EBB78FB44720F10422BE825B63D1C7745940DB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1530 5d8f95-5d8fc0 1531 5d9005-5d9008 1530->1531 1532 5d8fc2-5d8fcb 1530->1532 1533 5d900a-5d900f 1531->1533 1534 5d9064-5d9069 1531->1534 1532->1534 1535 5d8fd1-5d8ff5 call 5dfcb4 call 5e1221 call 5d8ffc 1532->1535 1536 5d9019-5d901b 1533->1536 1537 5d9011-5d9017 1533->1537 1539 5d906e-5d9073 1534->1539 1540 5d906b-5d906d 1534->1540 1535->1534 1555 5d8ff7 1535->1555 1541 5d901c-5d9025 1536->1541 1537->1541 1543 5d9074-5d907c RtlAllocateHeap 1539->1543 1540->1539 1545 5d9055-5d9056 1541->1545 1546 5d9027-5d9053 call 5dfcb4 call 5e1cc4 call 5d905b 1541->1546 1544 5d9082-5d9090 1543->1544 1545->1543 1546->1544 1546->1545 1555->1544
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 005D907C
                                                              • Part of subcall function 005DFCB4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFCF1
                                                              • Part of subcall function 005DFCB4: EnterCriticalSection.KERNEL32(?,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFD0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                            • String ID:
                                                            • API String ID: 1616793339-0
                                                            • Opcode ID: 8ec08ea2c924c909b59c300af9342ff282d32ebe7c11619cd78ce379eeaf0e38
                                                            • Instruction ID: 09522eea6c53038dc6314c9c2b0df1236d70be449a201506881ef74c61323e33
                                                            • Opcode Fuzzy Hash: 8ec08ea2c924c909b59c300af9342ff282d32ebe7c11619cd78ce379eeaf0e38
                                                            • Instruction Fuzzy Hash: 8721A332A04245EBDB30EB6DAC4AB9A7BA4FB00720F144127F514EB3D0C774A941DA55

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1558 5d8e6e-5d8e96 1559 5d8e9c-5d8ea4 1558->1559 1560 5d8f48-5d8f56 1558->1560 1561 5d8ea6-5d8ebe call 5dfcb4 call 5e0ecd 1559->1561 1562 5d8ee1-5d8ee4 1559->1562 1574 5d8ec9-5d8ed6 call 5d8ed8 1561->1574 1575 5d8ec0-5d8ec8 call 5e0ef8 1561->1575 1564 5d8f39 1562->1564 1565 5d8ee6-5d8f0b call 5dfcb4 call 5e1c28 1562->1565 1568 5d8f3a-5d8f42 RtlFreeHeap 1564->1568 1576 5d8f0d-5d8f19 call 5e1c7f 1565->1576 1577 5d8f1c-5d8f25 call 5d8f30 1565->1577 1568->1560 1586 5d8f29 1574->1586 1575->1574 1576->1577 1577->1586 1586->1560 1587 5d8f2b-5d8f2e 1586->1587 1587->1568
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,00000000,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074), ref: 005D8F42
                                                              • Part of subcall function 005DFCB4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFCF1
                                                              • Part of subcall function 005DFCB4: EnterCriticalSection.KERNEL32(?,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFD0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$EnterFreeHeapInitialize
                                                            • String ID:
                                                            • API String ID: 641406236-0
                                                            • Opcode ID: 04b427a55df56949080c880f240842ec9d895abdb337ec261fcf515ca9117cbf
                                                            • Instruction ID: 1447a8390f272f1d4d8db05219eb5a1331b5a87278219865f92cd809b0c012bd
                                                            • Opcode Fuzzy Hash: 04b427a55df56949080c880f240842ec9d895abdb337ec261fcf515ca9117cbf
                                                            • Instruction Fuzzy Hash: 9721C27294560AEADF20AB999C06BAE7F79FB45720F240527F410E23D0DB748940CAA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1588 5fb616-5fb635 call 5ff480 LoadStringA 1591 5fb639-5fb63a 1588->1591 1592 5fb637 1588->1592 1592->1591
                                                            APIs
                                                            • LoadStringA.USER32(?,?,?,?), ref: 005FB62D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LoadString
                                                            • String ID:
                                                            • API String ID: 2948472770-0
                                                            • Opcode ID: 82a880801e5d08906efaa71aee530ab6f1199bf736357138b4e2b1e52b71859b
                                                            • Instruction ID: 566ca7b208f0e282238efe5439be3387d1b48e5e3a7ef24473bfca7a846deded
                                                            • Opcode Fuzzy Hash: 82a880801e5d08906efaa71aee530ab6f1199bf736357138b4e2b1e52b71859b
                                                            • Instruction Fuzzy Hash: 99D0A9724593A39BCB01DF64D80CD9FBFA8BF98320B094C4DF59083211C328E844CB62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \main$\main\corn$\main\corn\libeay32.dll$\main\corn\sqlite3.dll$\main\corn\zlib.dll$\main\data$\main\data\app$\main\data\app\!tmp.xlz$\main\data\pack$\main\data\pack\origin$\main\data\plugin$\main\data\versiondownload$\main\plugin$\main\wke$\main\wke\$\main\work_plugin_tmp$\main\work_plugin_tmp\
                                                            • API String ID: 0-1824072935
                                                            • Opcode ID: cce16c0dc29e8666691254cd87ae415d179acc0e7e2869831ec293002b5af1ca
                                                            • Instruction ID: 26c4af1515f830f3e269d3404704aa3efc9029cf975fead263daa6ae651b8f83
                                                            • Opcode Fuzzy Hash: cce16c0dc29e8666691254cd87ae415d179acc0e7e2869831ec293002b5af1ca
                                                            • Instruction Fuzzy Hash: 7A6260B1F4030477EB50AAA19CC3F6F7AA5EF54704F044079FB05BA3C2E6B6AA508755
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,005DD7AE,?,Microsoft Visual C++ Runtime Library,00012010,?,00860CFC,?,00860D4C,?,?,?,Runtime Error!Program: ), ref: 005E4C32
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 005E4C4A
                                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 005E4C5B
                                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 005E4C68
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                            • API String ID: 2238633743-4044615076
                                                            • Opcode ID: e1390d88d63d0e02cca65ee5f025441b1b0106c97e04a45066dec27e20cf2b62
                                                            • Instruction ID: de4fbce00d682f29a0ce494114c779e92a484c627ae46b0b14b4045c67234134
                                                            • Opcode Fuzzy Hash: e1390d88d63d0e02cca65ee5f025441b1b0106c97e04a45066dec27e20cf2b62
                                                            • Instruction Fuzzy Hash: BB01B571614351AF87109FB79E889277EDAFA887603150469B54AC3221DAB49C00BF30
                                                            APIs
                                                            • GetVersionExA.KERNEL32 ref: 005DD4CB
                                                            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 005DD500
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 005DD560
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnvironmentFileModuleNameVariableVersion
                                                            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                            • API String ID: 1385375860-4131005785
                                                            • Opcode ID: fa03274e213e86f904198252615b5b51fb8a0383b59c7726dc10a3f852e706d4
                                                            • Instruction ID: 943668c1126a5bbfb7c16b57ccec6431720ccca8c3bfcde4f5e3552d89214658
                                                            • Opcode Fuzzy Hash: fa03274e213e86f904198252615b5b51fb8a0383b59c7726dc10a3f852e706d4
                                                            • Instruction Fuzzy Hash: F331F6719452886EEB35867C7C45BE97F78BB02308F6404DBE185DA342E6709E89CB31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: !
                                                            • API String ID: 0-2657877971
                                                            • Opcode ID: 0ea7c4aa144994aedc4b2d19b68276e92db77d8258ff7d3e863f327036cfbfcb
                                                            • Instruction ID: afcc0b830ff8fc352c1429649a0e47f960f10b6ddff15dd95f6362921a47e7e5
                                                            • Opcode Fuzzy Hash: 0ea7c4aa144994aedc4b2d19b68276e92db77d8258ff7d3e863f327036cfbfcb
                                                            • Instruction Fuzzy Hash: A4131470D00629EBDF00EF91EC86ADDBF71FF58310F14866AF9587A295DB721A608B41
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: b917172686b5d614e026440cdc05949f0510fa4c7c16ac5965b68feb5ee08fe6
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 9D112B64A10208DBEB00DFA4D580BAFB375FF5C700F105069D608EB395E77A9E10C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 4b9d438164f6e2214db0c9e65cd9984ff7cee6f9638b44ee477d6fad7f2157df
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 6E112B64A10209D7EB00CFA4D580BAFB376FF5C700F105069D908EB395E77A9E10C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 4dad3647fca4719f91576c2b966fa23797f4e4dcffaba2399a2060a7f383dc43
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 20112B64A10208D7EB00CFA4D580BAFB375FF6C700F105069D908EB395E77A9E51C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 2fefb3e5dec1af4fac95c34bb9b0853e4fc8bd943c71c77400ee65158f1d5662
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: AE111964A10208D7EB00DFA5D580BAFB375FF2C700F105069D508EB395E77A9E11C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66ad7dfa48c239ea3d0e4e6a6947198e39da5d0cc551757ff1b228b18c1839d9
                                                            • Instruction ID: 5c3b48c2abf1ef263d97beb9245c49f927de98a4584c7822c65cdc96364cf23e
                                                            • Opcode Fuzzy Hash: 66ad7dfa48c239ea3d0e4e6a6947198e39da5d0cc551757ff1b228b18c1839d9
                                                            • Instruction Fuzzy Hash: 49113C78A45318EFCB11CF59E9C0A89BBB0FF1E310B5154A9DA489B306D3706E50EB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                            • Instruction ID: d69b516b65d026ecdfe2c868a76ccb602657c2c5d6c07752d9e3d3657f5cfb13
                                                            • Opcode Fuzzy Hash: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                            • Instruction Fuzzy Hash: 8FD0C934250749CFDB01CF14C0E2B41B3A8EB89B58F108071DD419B345D2B8F945CAA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f257f19965b87bcb6f7454717a867be4e02cacbce74783232d48ec6df0bfb573
                                                            • Instruction ID: 431d3468442b92c2cdb8e9e687ab02f782d16e4631adfba4a2873e85dca12162
                                                            • Opcode Fuzzy Hash: f257f19965b87bcb6f7454717a867be4e02cacbce74783232d48ec6df0bfb573
                                                            • Instruction Fuzzy Hash: FFB0121630810517F300004FEC41702718DC3C426CF44C060A005E2381E083EC0001A0
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD0DE
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD0F2
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD11E
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD156
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD178
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD191
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD1A4
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 005DD1E2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                            • String ID: v]
                                                            • API String ID: 1823725401-2291034021
                                                            • Opcode ID: e63f48da157bcda2c4ac90e8bbbb8e7fe552414e3e559f0ff1665d52e1c84d81
                                                            • Instruction ID: 44a1fbb1b994fbf6a949b6afa0a61ca7f9344a5ae7da90bb61b5ea80c1978c2a
                                                            • Opcode Fuzzy Hash: e63f48da157bcda2c4ac90e8bbbb8e7fe552414e3e559f0ff1665d52e1c84d81
                                                            • Instruction Fuzzy Hash: A631A3B29092666FDB307BFC9C8883BBEBDF686358B15092BF955C3300E6615D45C2B1
                                                            APIs
                                                            • LCMapStringW.KERNEL32(00000000,00000100,00860F7C,00000001,00000000,00000000,74DEE860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0BF6
                                                            • LCMapStringA.KERNEL32(00000000,00000100,00860F78,00000001,00000000,00000000,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E0C12
                                                            • LCMapStringA.KERNEL32(?,?,?,005D942D,?,?,74DEE860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0C5B
                                                            • MultiByteToWideChar.KERNEL32(?,009C00A5,?,005D942D,00000000,00000000,74DEE860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0C93
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,?,005D942D,?,00000000,?,?,005D942D,?), ref: 005E0CEB
                                                            • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,005D942D,?), ref: 005E0D01
                                                            • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,005D942D,?), ref: 005E0D34
                                                            • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,005D942D,?), ref: 005E0D9C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: String$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 352835431-0
                                                            • Opcode ID: adff8b6602b683eecb763217cde7e0ccfa3a80c8f3106b84fa1ea256d63c0365
                                                            • Instruction ID: 1fce51368f76eb600062a1e878e49cf749de96192f7671c4da9e7cef5d0361e0
                                                            • Opcode Fuzzy Hash: adff8b6602b683eecb763217cde7e0ccfa3a80c8f3106b84fa1ea256d63c0365
                                                            • Instruction Fuzzy Hash: E6519C71900289EBCF228F95CE45EEF7FB9FB48750F205219F954A61A0D3B1AD90DB60
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 005DD6F7
                                                            • GetStdHandle.KERNEL32(000000F4,00860CFC,00000000,00000000,00000000,?), ref: 005DD7CD
                                                            • WriteFile.KERNEL32(00000000), ref: 005DD7D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$HandleModuleNameWrite
                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                            • API String ID: 3784150691-4022980321
                                                            • Opcode ID: 3477663a78481da2145b23645d776c95fe424290794b95652a2bcb580411782f
                                                            • Instruction ID: 490313afeb54315750d49439658081c5b307ba026fe74bc99ab2ff5815c0e36c
                                                            • Opcode Fuzzy Hash: 3477663a78481da2145b23645d776c95fe424290794b95652a2bcb580411782f
                                                            • Instruction Fuzzy Hash: 6331E672A00218AFDF34E6A4CD49FAA3BBDFB81300F501597F544E6281E670AA848F61
                                                            APIs
                                                            • GetStringTypeW.KERNEL32(00000001,00860F7C,00000001,?,74DEE860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E4389
                                                            • GetStringTypeA.KERNEL32(00000000,00000001,00860F78,00000001,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E43A3
                                                            • GetStringTypeA.KERNEL32(?,?,?,?,005D942D,74DEE860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E43D7
                                                            • MultiByteToWideChar.KERNEL32(?,009C00A5,?,?,00000000,00000000,74DEE860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E440F
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,005D942D,?), ref: 005E4465
                                                            • GetStringTypeW.KERNEL32(?,?,00000000,005D942D,?,?,?,?,?,?,005D942D,?), ref: 005E4477
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: StringType$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 3852931651-0
                                                            • Opcode ID: 5deb1587c8aa3ac978f4e12739704dd0cfc3abfd689b95beb43a99dfb15dda5e
                                                            • Instruction ID: 394e11ce305d34699af0339132734e3aa4eeaaac1cb23251ffc25468070425e2
                                                            • Opcode Fuzzy Hash: 5deb1587c8aa3ac978f4e12739704dd0cfc3abfd689b95beb43a99dfb15dda5e
                                                            • Instruction Fuzzy Hash: BE416D72A40299EFCF209F95DC89AAF7FB9FB18750F10491AFA51D2290C3349950DBA0
                                                            APIs
                                                            • TlsGetValue.KERNEL32(009BBD84,009BBD74,00000000,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF81B
                                                            • EnterCriticalSection.KERNEL32(009BBDA0,00000010,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF86A
                                                            • LeaveCriticalSection.KERNEL32(009BBDA0,00000000,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF87D
                                                            • LocalAlloc.KERNEL32(00000000,00000005,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF893
                                                            • LocalReAlloc.KERNEL32(?,00000005,00000002,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF8A5
                                                            • TlsSetValue.KERNEL32(009BBD84,00000000), ref: 005FF8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCriticalLocalSectionValue$EnterLeave
                                                            • String ID:
                                                            • API String ID: 4117633390-0
                                                            • Opcode ID: e1dca5834538845a6832ef52dd5ad30bd93259b6ae781085200fb12343fbce57
                                                            • Instruction ID: d34c16330a939a668798d1364149905177e11a213c539be323633408254a3631
                                                            • Opcode Fuzzy Hash: e1dca5834538845a6832ef52dd5ad30bd93259b6ae781085200fb12343fbce57
                                                            • Instruction Fuzzy Hash: 74318C31500609EFE724CF54C899F6ABBA9FF84360F008629F616C7A50E734F905CBA0
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 00600397
                                                              • Part of subcall function 00600483: lstrlenA.KERNEL32(00000104,00000000,?,006003C7), ref: 006004BA
                                                            • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00600438
                                                            • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 00600465
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileModuleNamelstrcatlstrcpylstrlen
                                                            • String ID: .HLP$.INI
                                                            • API String ID: 2421895198-3011182340
                                                            • Opcode ID: 1a4bd1553bb18208485cb963076845060f068ef80e1d30a7f3b4df79ae0796a4
                                                            • Instruction ID: ca9d46c6d654c8e0c68d7634694f7d9c9df430897e786ef552aa4c2374b1e95b
                                                            • Opcode Fuzzy Hash: 1a4bd1553bb18208485cb963076845060f068ef80e1d30a7f3b4df79ae0796a4
                                                            • Instruction Fuzzy Hash: EA317CB5844709DFEB24DB74D888BC7B7EDFB08300F10496AE299D3281DB74A9808B90
                                                            APIs
                                                            • GetStartupInfoA.KERNEL32(?), ref: 005DD253
                                                            • GetFileType.KERNEL32(?,?,00000000), ref: 005DD2FE
                                                            • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 005DD361
                                                            • GetFileType.KERNEL32(00000000,?,00000000), ref: 005DD36F
                                                            • SetHandleCount.KERNEL32 ref: 005DD3A6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileHandleType$CountInfoStartup
                                                            • String ID:
                                                            • API String ID: 1710529072-0
                                                            • Opcode ID: 61ac8dbe7b3e49b3282e4fe6dafd815620d22f25a7b6f6b2d0f7e8bd7d942488
                                                            • Instruction ID: 05fd84a3848206fa4a9ec357fa2059fc16d0a78af726c087a73e38d92a0bf690
                                                            • Opcode Fuzzy Hash: 61ac8dbe7b3e49b3282e4fe6dafd815620d22f25a7b6f6b2d0f7e8bd7d942488
                                                            • Instruction Fuzzy Hash: E951D371908202CFC730CB2CC888B697FB0BB51364F298A6BD5A69B3E1D730D945C762
                                                            APIs
                                                            • GetLastError.KERNEL32(00000103,7FFFFFFF,005D9A22,005DC2D8,00000000,?,?,00000000,00000001), ref: 005DD41A
                                                            • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 005DD428
                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 005DD474
                                                              • Part of subcall function 005D9E16: RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005D9F0C
                                                            • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 005DD44C
                                                            • GetCurrentThreadId.KERNEL32 ref: 005DD45D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastValue$AllocateCurrentHeapThread
                                                            • String ID:
                                                            • API String ID: 2047054392-0
                                                            • Opcode ID: 298ff72e5404d0feb93b0c30fef02af1e5626a445150cb8d07b75657c79bbe54
                                                            • Instruction ID: 386ebc68ed5a8ef154abcd70a4e6158382be9351ea63529ae7c314bf4bd13e5a
                                                            • Opcode Fuzzy Hash: 298ff72e5404d0feb93b0c30fef02af1e5626a445150cb8d07b75657c79bbe54
                                                            • Instruction Fuzzy Hash: 50F0F032948722ABDB302F38BC0D65A3F61FF41B72B10461BF951962A0CF70A841A7A0
                                                            APIs
                                                            • HeapAlloc.KERNEL32(00000000,00002020,0095D630,0095D630,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E19ED
                                                            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E1A11
                                                            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E1A2B
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000,?), ref: 005E1AEC
                                                            • HeapFree.KERNEL32(00000000,00000000,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000,?,00000000), ref: 005E1B03
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual$FreeHeap
                                                            • String ID:
                                                            • API String ID: 714016831-0
                                                            • Opcode ID: ba81a3e1d532537e0d90a06d2c78681f1c5f2f3b36023a7d5f6fa9d71c76aec9
                                                            • Instruction ID: 42f027b26e4ec1c66c6bdc23522626e8f7a632078cb100c2467eaba4925fc80d
                                                            • Opcode Fuzzy Hash: ba81a3e1d532537e0d90a06d2c78681f1c5f2f3b36023a7d5f6fa9d71c76aec9
                                                            • Instruction Fuzzy Hash: 8A310171643B46DBD334CF2ADC40B26BBE4FB44751F10463AE599972D0E770A884DB88
                                                            APIs
                                                            • GetVersion.KERNEL32 ref: 005D7676
                                                              • Part of subcall function 005DD5F4: HeapCreate.KERNEL32(00000000,00001000,00000000,005D76AE,00000001), ref: 005DD605
                                                              • Part of subcall function 005DD5F4: HeapDestroy.KERNEL32 ref: 005DD644
                                                            • GetCommandLineA.KERNEL32 ref: 005D76D6
                                                            • GetStartupInfoA.KERNEL32(?), ref: 005D7701
                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 005D7724
                                                              • Part of subcall function 005D777D: ExitProcess.KERNEL32 ref: 005D779A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                            • String ID:
                                                            • API String ID: 2057626494-0
                                                            • Opcode ID: 4f90bdbaab5436fa3481b3a853eefced6ebebb898f9e995c062764fd17b0a8c9
                                                            • Instruction ID: 28382f7c6ba52da0fc9470a6f1af113f0cbebce2947f8b77c1b73987b66654ba
                                                            • Opcode Fuzzy Hash: 4f90bdbaab5436fa3481b3a853eefced6ebebb898f9e995c062764fd17b0a8c9
                                                            • Instruction Fuzzy Hash: C42193B185860A9BD728AFAC9C49A6E7F79FB45711F10052BF801AA3A1EB744840CB61
                                                            APIs
                                                            • GetCPInfo.KERNEL32(?,00000000), ref: 005DC58D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID: $
                                                            • API String ID: 1807457897-3032137957
                                                            • Opcode ID: fbf2d55d1992b2828341290ee368b2b0097591ab566d181a6b4a3f829bcea1c1
                                                            • Instruction ID: 2c63d1f4cdd37fc31a6556ad44406ea7d4b948badd6e4a697e2d24fb48ba51b6
                                                            • Opcode Fuzzy Hash: fbf2d55d1992b2828341290ee368b2b0097591ab566d181a6b4a3f829bcea1c1
                                                            • Instruction Fuzzy Hash: 01413A314082999BEB26872CDC4DFFB7F99BB46704F1814D7E185D7293C2718A44DB62
                                                            APIs
                                                            • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,005E12F2,00000000,00000000,00000000,005D8FE3,00000000,00000000,?,00000000,00000000,00000000), ref: 005E1552
                                                            • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,005E12F2,00000000,00000000,00000000,005D8FE3,00000000,00000000,?,00000000,00000000,00000000), ref: 005E1586
                                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 005E15A0
                                                            • HeapFree.KERNEL32(00000000,?), ref: 005E15B7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocHeap$FreeVirtual
                                                            • String ID:
                                                            • API String ID: 3499195154-0
                                                            • Opcode ID: df78756c7a05a62308931e25ee23a5f4508a8533a6b5e18d90e139d77e79bd16
                                                            • Instruction ID: e2a0f356ed66ca4fc86a221981e89018d853a520857c077296c063ecea21e913
                                                            • Opcode Fuzzy Hash: df78756c7a05a62308931e25ee23a5f4508a8533a6b5e18d90e139d77e79bd16
                                                            • Instruction Fuzzy Hash: BA115830A08700EFD764CF19EC85E227BB2FBC5720B114A1AE5A2C21F0C330A945EF10
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(009BBF48,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007BA
                                                            • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007CC
                                                            • LeaveCriticalSection.KERNEL32(009BBF48,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007D5
                                                            • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB,005FA80A), ref: 006007E7
                                                              • Part of subcall function 006006EC: GetVersion.KERNEL32(?,0060078F,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 006006FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Enter$InitializeLeaveVersion
                                                            • String ID:
                                                            • API String ID: 1193629340-0
                                                            • Opcode ID: 61d0ed3ea336d5170fed718c0ebdc8c6f569a0c0c731bc1147ae36bf2bdedb18
                                                            • Instruction ID: cdf30a1604c954d203961bd91cbc315bc7a298ca3c130c6cabe5229e7129eaf1
                                                            • Opcode Fuzzy Hash: 61d0ed3ea336d5170fed718c0ebdc8c6f569a0c0c731bc1147ae36bf2bdedb18
                                                            • Instruction Fuzzy Hash: 24F0AF7145820EDFDB14AF64ECC0AA7B3AEFB10326F00113AEA01921A1E774B455EFA0
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFC98
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCA0
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCA8
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1800592084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1800573964.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1800748036.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801070127.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801086705.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801105728.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801139225.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801156606.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801173915.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801190842.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801213089.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801231609.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801247691.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1801350616.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInitializeSection
                                                            • String ID:
                                                            • API String ID: 32694325-0
                                                            • Opcode ID: 2bc9a27d71ab4e8de4f6aa7b1144a222d394af5d26f99d7cb11bfd8e037d7805
                                                            • Instruction ID: 2e59d2f79542d63eef59b7d5057a635145d94a90fb1d99f76d98b8f866eeaf26
                                                            • Opcode Fuzzy Hash: 2bc9a27d71ab4e8de4f6aa7b1144a222d394af5d26f99d7cb11bfd8e037d7805
                                                            • Instruction Fuzzy Hash: D4C00231C2F2349BCF362B67FD0584A3F66EB442663011067A5045203096722D10FFD1