Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wRhEMj1swo.exe

Overview

General Information

Sample name:wRhEMj1swo.exe
renamed because original name is a hash value
Original sample name:d7ae3392a9ce8d10923040dd4c3ef0af.exe
Analysis ID:1585798
MD5:d7ae3392a9ce8d10923040dd4c3ef0af
SHA1:37c5b3cf8831a841c5ed87a4129595c8a721302e
SHA256:dbac017142912cc3bef0a236b80857511776be8119f7abd64253cccd23ebd6e4
Tags:exeuser-abuse_ch
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Yara detected aPLib compressed binary
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wRhEMj1swo.exe (PID: 6480 cmdline: "C:\Users\user\Desktop\wRhEMj1swo.exe" MD5: D7AE3392A9CE8D10923040DD4C3EF0AF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
wRhEMj1swo.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\update.exeCN_Honker_WordpressScannerSample from CN Honker Pentest Toolset - file WordpressScanner.exeFlorian Roth
    • 0xd571c:$s0: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    • 0xe8368:$s1: (http://www.eyuyan.com)
    • 0xcbd6c:$s2: GetConnectString
    • 0xe2cd4:$s4: #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_CHS)
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000000.2125981168.00000000006F0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Process Memory Space: wRhEMj1swo.exe PID: 6480JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.wRhEMj1swo.exe.70cec9.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.0.wRhEMj1swo.exe.70cec9.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.0.wRhEMj1swo.exe.742ca5.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                0.2.wRhEMj1swo.exe.742ca5.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  0.0.wRhEMj1swo.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-08T09:46:58.963117+010020283713Unknown Traffic192.168.2.549704103.235.47.188443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://47.92.98.180:88/MQNT/MQNT.exeAvira URL Cloud: Label: malware
                    Source: C:\Users\user\Desktop\update.exeReversingLabs: Detection: 36%
                    Source: wRhEMj1swo.exeReversingLabs: Detection: 54%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: C:\Users\user\Desktop\update.exeJoe Sandbox ML: detected
                    Source: wRhEMj1swo.exeJoe Sandbox ML: detected
                    Source: wRhEMj1swo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 103.235.47.188:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                    Source: Joe Sandbox ViewIP Address: 103.235.47.188 103.235.47.188
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 103.235.47.188:443
                    Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveAccept: text/html, application/xhtml+xml, */*Accept-Encoding: identityAccept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Host: www.baidu.com
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: www.baidu.com
                    Source: update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/GX_RZ.txt
                    Source: wRhEMj1swo.exeString found in binary or memory: http://47.92.98.180:88/MQNT/MQNT.exe
                    Source: wRhEMj1swo.exe, update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/data.txt
                    Source: wRhEMj1swo.exeString found in binary or memory: http://ip-api.com/json/?lang=zh-CN
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q1.qlogo.cn/g?b=qq&nk=
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=100
                    Source: wRhEMj1swo.exeString found in binary or memory: http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=1007451f2903af691535062ed068339ac36
                    Source: wRhEMj1swo.exeString found in binary or memory: http://whois.pconline.com.cn/ipJson.jsp?json=true
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.eyuyan.com
                    Source: wRhEMj1swo.exe, update.exe.0.drString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.eyuyan.comservice
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ibsensoftware.com/
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ip138.com
                    Source: wRhEMj1swo.exeString found in binary or memory: http://www.ip138.comUser-Agent:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: wRhEMj1swo.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/h
                    Source: wRhEMj1swo.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=
                    Source: wRhEMj1swo.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=content-type:
                    Source: wRhEMj1swo.exeString found in binary or memory: https://ip.cn/api/index?ip=&type=0
                    Source: wRhEMj1swo.exeString found in binary or memory: https://ipinfo.io/json
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.baidu.com
                    Source: wRhEMj1swo.exe, 00000000.00000003.2206566736.0000000000A93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.baidu.comDate:KB3140245/
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.uc.cn/ip
                    Source: wRhEMj1swo.exeString found in binary or memory: https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 103.235.47.188:443 -> 192.168.2.5:49704 version: TLS 1.2

                    System Summary

                    barindex
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe Author: Florian Roth
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004119E8: CreateFileA,DeviceIoControl,CloseHandle,0_2_004119E8
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004175E60_2_004175E6
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: String function: 00401111 appears 85 times
                    Source: wRhEMj1swo.exe, 00000000.00000000.2125981168.00000000006F0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exe, 00000000.00000000.2125981168.00000000006F0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs wRhEMj1swo.exe
                    Source: wRhEMj1swo.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: CN_Honker_WordpressScanner date = 2015-06-23, author = Florian Roth, description = Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, score = 0b3c5015ba3616cbc616fc9ba805fea73e98bc83, reference = Disclosed CN Honker Pentest Toolset, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: classification engineClassification label: mal88.evad.winEXE@1/3@1/1
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_00401BFE CreateToolhelp32Snapshot,Module32First,0_2_00401BFE
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile created: C:\Users\user\Desktop\update.exeJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeMutant created: \Sessions\1\BaseNamedObjects\NULL
                    Source: wRhEMj1swo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: wRhEMj1swo.exeReversingLabs: Detection: 54%
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: avifil32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile written: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeAutomated click: OK
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeAutomated click: OK
                    Source: wRhEMj1swo.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: wRhEMj1swo.exeStatic file information: File size 5660160 > 1048576
                    Source: wRhEMj1swo.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x205c00
                    Source: wRhEMj1swo.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x32e200

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: wRhEMj1swo.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.70cec9.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.70cec9.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.742ca5.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.742ca5.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.wRhEMj1swo.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.wRhEMj1swo.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2125981168.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: wRhEMj1swo.exe PID: 6480, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005E4C20 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005E4C20
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005DB148 push eax; ret 0_2_005DB166
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005D8C50 push eax; ret 0_2_005D8C7E
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile created: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeDropped PE file which has not been started: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exe TID: 3716Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: wRhEMj1swo.exe, 00000000.00000002.2444451917.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                    Source: wRhEMj1swo.exe, 00000000.00000002.2444709016.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.2177781568.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.2206566736.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: wRhEMj1swo.exe, 00000000.00000002.2444709016.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.2177781568.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, wRhEMj1swo.exe, 00000000.00000003.2206566736.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWk
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005E4C20 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005E4C20
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0044086C mov ebx, dword ptr fs:[00000030h]0_2_0044086C
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004222F3 mov ebx, dword ptr fs:[00000030h]0_2_004222F3
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0047FB4C mov ebx, dword ptr fs:[00000030h]0_2_0047FB4C
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_00421EEC mov ebx, dword ptr fs:[00000030h]0_2_00421EEC
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_0043E797 mov ebx, dword ptr fs:[00000030h]0_2_0043E797
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004706E8 HeapAlloc,RtlFreeHeap,GetProcessHeap,HeapReAlloc,0_2_004706E8
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_004200FF cpuid 0_2_004200FF
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeCode function: 0_2_005DD4AC GetVersionExA,GetEnvironmentVariableA,GetModuleFileNameA,0_2_005DD4AC
                    Source: C:\Users\user\Desktop\wRhEMj1swo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    OS Credential Dumping121
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                    Virtualization/Sandbox Evasion
                    LSASS Memory2
                    Virtualization/Sandbox Evasion
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive12
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS2
                    File and Directory Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    wRhEMj1swo.exe54%ReversingLabsWin32.Ransomware.Generic
                    wRhEMj1swo.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\Desktop\update.exe100%Joe Sandbox ML
                    C:\Users\user\Desktop\update.exe37%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.ip138.comUser-Agent:0%Avira URL Cloudsafe
                    https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip0%Avira URL Cloudsafe
                    http://www.eyuyan.comservice0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/GX_RZ.txt0%Avira URL Cloudsafe
                    https://www.baidu.comDate:KB3140245/0%Avira URL Cloudsafe
                    http://www.eyuyan.com0%Avira URL Cloudsafe
                    https://www.uc.cn/ip0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/MQNT.exe100%Avira URL Cloudmalware
                    http://47.92.98.180:88/MQNT/data.txt0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    www.wshifen.com
                    103.235.47.188
                    truefalse
                      high
                      www.baidu.com
                      unknown
                      unknownfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.eyuyan.com)DVarFileInfo$wRhEMj1swo.exe, update.exe.0.drfalse
                          high
                          https://api.ip.sb/ipwRhEMj1swo.exefalse
                            high
                            http://whois.pconline.com.cn/ipJson.jsp?json=truewRhEMj1swo.exefalse
                              high
                              http://www.ip138.comUser-Agent:wRhEMj1swo.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://club.vip.qq.com/api/aggregation?g_tk=content-type:wRhEMj1swo.exefalse
                                high
                                http://www.ibsensoftware.com/wRhEMj1swo.exefalse
                                  high
                                  https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:wRhEMj1swo.exefalse
                                    high
                                    https://ip.cn/api/index?ip=&type=0wRhEMj1swo.exefalse
                                      high
                                      https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonipwRhEMj1swo.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.eyuyan.comwRhEMj1swo.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ip-api.com/json/?lang=zh-CNwRhEMj1swo.exefalse
                                        high
                                        http://q1.qlogo.cn/g?b=qq&nk=wRhEMj1swo.exefalse
                                          high
                                          http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=100wRhEMj1swo.exefalse
                                            high
                                            https://www.baidu.comwRhEMj1swo.exefalse
                                              high
                                              http://47.92.98.180:88/MQNT/GX_RZ.txtupdate.exe.0.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://club.vip.qq.com/api/aggregation?g_tk=wRhEMj1swo.exefalse
                                                high
                                                http://www.eyuyan.comservicewRhEMj1swo.exefalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://q4.qlogo.cn/g?b=qq&nk=2911606375&s=1007451f2903af691535062ed068339ac36wRhEMj1swo.exefalse
                                                  high
                                                  https://cdid.c-ctrip.com/model-poc2/hwRhEMj1swo.exefalse
                                                    high
                                                    https://ipinfo.io/jsonwRhEMj1swo.exefalse
                                                      high
                                                      https://www.baidu.comDate:KB3140245/wRhEMj1swo.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://47.92.98.180:88/MQNT/MQNT.exewRhEMj1swo.exefalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      http://47.92.98.180:88/MQNT/data.txtwRhEMj1swo.exe, update.exe.0.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.uc.cn/ipwRhEMj1swo.exefalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.ip138.comwRhEMj1swo.exefalse
                                                        high
                                                        https://www.baidu.com/wRhEMj1swo.exe, 00000000.00000003.2206566736.0000000000A93000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          103.235.47.188
                                                          www.wshifen.comHong Kong
                                                          55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1585798
                                                          Start date and time:2025-01-08 09:45:57 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 29s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Run name:Run with higher sleep bypass
                                                          Number of analysed new started processes analysed:4
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:wRhEMj1swo.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:d7ae3392a9ce8d10923040dd4c3ef0af.exe
                                                          Detection:MAL
                                                          Classification:mal88.evad.winEXE@1/3@1/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:Failed
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                          • Stop behavior analysis, all processes terminated
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          No simulations
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          103.235.47.188VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          Iifpj4i2kC.exeGet hashmaliciousFormBookBrowse
                                                          • www.zruypj169g.top/md02/?oHH8=VZUPDXU8mXkToFn&0PG4QdD=KBMih/6UmjMCLIvQj8A+JVJ0ZduXlvkac/jrKRN7UGcA2YCWIWeuvW479UURmW6VwJBRFqK2PA==
                                                          3.exeGet hashmaliciousBlackMoon, XRedBrowse
                                                          • www.baidu.com/
                                                          CZyOWoN2hiszA6d.exeGet hashmaliciousFormBookBrowse
                                                          • www.vicmvm649n.top/v15n/?Yn=UsBn8mn1PUl4czyMQZxenuqc6dPBc+Q3khu6MN2NNQj7YA4ug5lWpId+R/K0fD87Hm6v&mv=Y4QppplhSjwxWBd
                                                          f2.exeGet hashmaliciousBlackMoonBrowse
                                                          • www.baidu.com/
                                                          f1.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          chAJcIK6ZO.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          LisectAVT_2403002A_489.exeGet hashmaliciousUnknownBrowse
                                                          • www.baidu.com/
                                                          d48c236503a4d2e54e23d9ebc9aa48e86300fd24955c871a7b8792656c47fb6a.exeGet hashmaliciousBdaejecBrowse
                                                          • www.baidu.com/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          www.wshifen.comU02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                          • 103.235.47.188
                                                          2024-12-10#U67e5#U9605_uninst.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          2024-12-10#U67e5#U9605_uninst.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 103.235.47.188
                                                          b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 103.235.47.188
                                                          VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                          • 103.235.46.96
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdU02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
                                                          • 103.235.47.188
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          letsVPN.exeGet hashmaliciousUnknownBrowse
                                                          • 103.235.46.96
                                                          db0fa4b8db0333367e9bda3ab68b8042.m68k.elfGet hashmaliciousMirai, GafgytBrowse
                                                          • 106.13.224.246
                                                          arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 119.75.215.154
                                                          nsharm7.elfGet hashmaliciousMiraiBrowse
                                                          • 182.61.224.140
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 182.61.224.138
                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                          • 103.235.47.188
                                                          elitebotnet.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 180.76.189.193
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          a0e9f5d64349fb13191bc781f81f42e1chu4rWexSX.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          xHj1N8ylIf.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          GR7ShhQTKE.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          ab89jay39E.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          [UPD]Intel_Unit.2.1.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          socolo.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          Installer.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                          • 103.235.47.188
                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          setup.exeGet hashmaliciousLummaCBrowse
                                                          • 103.235.47.188
                                                          No context
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):434
                                                          Entropy (8bit):3.99579928616557
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmWvclLwv2G4wmDg86uCEuyLyn:QCGwv4o0BlLweTV6uuyW
                                                          MD5:0BB7D8A5E92F0E36B8ECF8FE6D8EC231
                                                          SHA1:B2B271FAB543C3C9D94FCB655F0DB2047256F4E3
                                                          SHA-256:F96E2B45F8B28D4708B5977297A772FC6CD40435D7924E90B3607A9B4D03E337
                                                          SHA-512:8F4AD1530D8FA8CDA49FD25C0302283D7BFB59B262593AAF31823B9943F34BFF1F12976B0DFF168C8CAB278348DBF8B1F24CD6D625850D37C6A8EC82D1569BBB
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.o.c.u.m.e.n.t.s.\.1.9.C.A.D.7.2.1.B.5.9.B.0.9.B.2.0.8.B.5.A.7.E.2.F.6.3.8.7.8.4.3...i.c.o.....I.n.f.o.T.i.p.=.P.i.k.a.c.h.u.N.T............. ............. .................Q.Q.........................
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):954368
                                                          Entropy (8bit):6.344965617584001
                                                          Encrypted:false
                                                          SSDEEP:24576:YvtI2D6CEhvugYa3EZfup4jflORg0RBQI:YevLEZ7cRg0RJ
                                                          MD5:8A619EBB79546DD4487F312B9C57934F
                                                          SHA1:6986759E032DB2694D625C85EC5C8B4AD74A689B
                                                          SHA-256:0C274B149400E89EBC0F6335A9181005B4249CABEFA8EC8B47C1D56710B2D3EF
                                                          SHA-512:AB29923B35AA1D21813F9D6B012979385F7C4B161FEE51C28A4987768B93297C81E88EAA969B9F491F0A359FD18F3515CC19C694ABD95413A575053C5BA29C7B
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: CN_Honker_WordpressScanner, Description: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, Source: C:\Users\user\Desktop\update.exe, Author: Florian Roth
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 37%
                                                          Reputation:low
                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......p.-.4.C.4.C.4.C.[.H.=.C.[.I.2.C...M...C.O.O.1.C.b.P...C.V.P.(.C.4.B...C.....7.C...H.E.C...I..C..H.W.C..I./.C.4.C.m.C..E.5.C.Rich4.C.........................PE..L.....|g.........................................@..........................................................................Q..,....0...e..............................................................................0............................text...n........................... ..`.rdata.............................@..@.data...j...........................@....rsrc....e...0...p... ..............@..@................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          File Type:MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
                                                          Category:dropped
                                                          Size (bytes):67646
                                                          Entropy (8bit):5.7039139970238075
                                                          Encrypted:false
                                                          SSDEEP:1536:vrpcQaRJlr5a3QEC2ADfYVmqpPZf++r7MJsEzlDtr66Evbag:vrpcQaGHVmOhf++razdtYp
                                                          MD5:19CAD721B59B09B208B5A7E2F6387843
                                                          SHA1:7AB6F085A11E86D5514E182BF0DF1C96723C8901
                                                          SHA-256:F9DFF22EF297227202F34343DA1BA9585F843B3AA0834B1074F273C9D9542252
                                                          SHA-512:E6DB461CB85A7B4C9F44019678E49562B68B820FFF6F0EE82A7533F710858C7AA7DF72FE57E4FE0A6A8291C33AAD819C5DCD7B75F9A55CFF12AF12344A555E81
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:............ .(.......(............. .................................................200.............................................. ...! ..! ..! ..$!..$!..$"..%#..&#..&#..'$..'$..(%.!(%.&+).),*.,-+.,-+.),*.*-+.,-+.-.,.+.,.+.,.-.,.-.,.-.,.,-+.*,,.(-,.(-,.'-,.'-,.'-,.&.-.'/..)/..)/..+32.+32.-32.-32.+33.+33.-32.-32..43..43..31..31..31..31..31./42.-41.+2/.*/-.+0..+2/.+2/.-0..).,.(-+.'.+.'.+.'.+.(-+.'.+.(/,.&/,.(/,.(/,.(/,.(/,.(/,.(/,.(/,.&/,.#,).!,). +(..*'..(%..'$..%"..%"..&$..&$..$#..#"..#".."!.." .." .........................................PRR.............................................#%&.............................................. ..!!..!!..#!..$"..&$..%#..'$..&$..(%..'%..(&..(&..)'.!,*.$,+.%-,.%-,.%-,.%-,.&.-.'/..'20.(31.*21.*21.*21.+32.)33.)33.*44.(44.)55.)55.)55.)55.*66.+77.)55.)55.)55.)55.)55.)55.)55.)55.-77.-86.-86.-86.-86.-86.-86.-86.,75.+64.)42.(31.+64.+64.+32.(31.)42.'42.'42.'42.'42.'42.'42.&42.#0..#0..#0.."/-."/-.!.,.!.,.!.,..-+...+..,*..,)..*(..)&..'%..&$..%#..%$..$
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.061578692374249
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.26%
                                                          • UPX compressed Win32 Executable (30571/9) 0.30%
                                                          • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                          • Windows Screen Saver (13104/52) 0.13%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          File name:wRhEMj1swo.exe
                                                          File size:5'660'160 bytes
                                                          MD5:d7ae3392a9ce8d10923040dd4c3ef0af
                                                          SHA1:37c5b3cf8831a841c5ed87a4129595c8a721302e
                                                          SHA256:dbac017142912cc3bef0a236b80857511776be8119f7abd64253cccd23ebd6e4
                                                          SHA512:731bee53652b0f6190ff9df76417f7f30193c939f635b023bf58a464ee2428535daf153e937fd591aa94d06999dd3db7fa86c3daf211b65416ab9d0046b1bf8e
                                                          SSDEEP:98304:HdxNmK4FEV5TEZ7ce0Rg52Pw8B4DgXUtJBAUZLn:HtaV0RgYPxoKWJV7
                                                          TLSH:B346BF23F042C0B2D5261AF032B6573CA9759FA11A35C983EBE4FEB5ED33162979510E
                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........D.}ID.}ID.}I+.vIM.}I+.wIB.}I?.qIA.}I..nIh.}I.. IF.}I..sIh.}ID.|I..}I&.nI[.}IM..IE.}I..oIN.}Ir.vI..}Ir.wI..}I..vI*.}I..wIt.}
                                                          Icon Hash:2731d28aae6e218f
                                                          Entrypoint:0x5d7650
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:
                                                          Time Stamp:0x677CD3FB [Tue Jan 7 07:12:59 2025 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:1841bc7befa66af3a16d317711e55a7e
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          push FFFFFFFFh
                                                          push 00860868h
                                                          push 005DA5B4h
                                                          mov eax, dword ptr fs:[00000000h]
                                                          push eax
                                                          mov dword ptr fs:[00000000h], esp
                                                          sub esp, 58h
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          mov dword ptr [ebp-18h], esp
                                                          call dword ptr [006071C8h]
                                                          xor edx, edx
                                                          mov dl, ah
                                                          mov dword ptr [009BC1D4h], edx
                                                          mov ecx, eax
                                                          and ecx, 000000FFh
                                                          mov dword ptr [009BC1D0h], ecx
                                                          shl ecx, 08h
                                                          add ecx, edx
                                                          mov dword ptr [009BC1CCh], ecx
                                                          shr eax, 10h
                                                          mov dword ptr [009BC1C8h], eax
                                                          push 00000001h
                                                          call 00007FAE94BEF4BBh
                                                          pop ecx
                                                          test eax, eax
                                                          jne 00007FAE94BE957Ah
                                                          push 0000001Ch
                                                          call 00007FAE94BE9638h
                                                          pop ecx
                                                          call 00007FAE94BEF266h
                                                          test eax, eax
                                                          jne 00007FAE94BE957Ah
                                                          push 00000010h
                                                          call 00007FAE94BE9627h
                                                          pop ecx
                                                          xor esi, esi
                                                          mov dword ptr [ebp-04h], esi
                                                          call 00007FAE94BEF094h
                                                          call dword ptr [006073F0h]
                                                          mov dword ptr [009C1444h], eax
                                                          call 00007FAE94BEEF52h
                                                          mov dword ptr [009BC140h], eax
                                                          call 00007FAE94BEECFBh
                                                          call 00007FAE94BEEC3Dh
                                                          call 00007FAE94BECAEEh
                                                          mov dword ptr [ebp-30h], esi
                                                          lea eax, dword ptr [ebp-5Ch]
                                                          push eax
                                                          call dword ptr [00607260h]
                                                          call 00007FAE94BEEBCEh
                                                          mov dword ptr [ebp-64h], eax
                                                          test byte ptr [ebp-30h], 00000001h
                                                          je 00007FAE94BE9578h
                                                          movzx eax, word ptr [ebp+00h]
                                                          Programming Language:
                                                          • [ASM] VS2008 SP1 build 30729
                                                          • [C++] VS98 (6.0) SP6 build 8804
                                                          • [ C ] VS98 (6.0) SP6 build 8804
                                                          • [C++] VS98 (6.0) build 8168
                                                          • [ C ] VS98 (6.0) build 8168
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5327380x168.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c20000x791c.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x2070000x80c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x205b5e0x205c0050aeeeb9ec9474888a2b10d9199f7d4bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x2070000x32e0c00x32e2001a465cc638bc8f7704c968afb5dde86dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x5360000x8b44a0x2a2000c1683502fdca9c65eabe46d3c312c96False0.3508844120919881data5.9722288998144375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x5c20000x791c0x7a00b0d5482a2c2286e7ebd7b631f9302e7dFalse0.44041367827868855data5.292361705762094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          TEXTINCLUDE0x5c2d9c0xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                                          TEXTINCLUDE0x5c2da80x16dataChineseChina1.3636363636363635
                                                          TEXTINCLUDE0x5c2dc00x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                                          WAVE0x5c2f140x1448RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 22050 HzChineseChina0.8330123266563945
                                                          RT_CURSOR0x5c435c0x134dataChineseChina0.5811688311688312
                                                          RT_CURSOR0x5c44900x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                                          RT_CURSOR0x5c45c40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                                          RT_CURSOR0x5c46f80xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                                          RT_CURSOR0x5c47ac0x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\370\017\377\377\374\037\377\377\376?\377\377\377\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.32792207792207795
                                                          RT_CURSOR0x5c48e00x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.3246753246753247
                                                          RT_BITMAP0x5c4a140x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                                                          RT_BITMAP0x5c4b800x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                                          RT_BITMAP0x5c4dc80x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                                          RT_BITMAP0x5c4f0c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                                          RT_BITMAP0x5c50640x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                                          RT_BITMAP0x5c51bc0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                                          RT_BITMAP0x5c53140x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                                          RT_BITMAP0x5c546c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                                          RT_BITMAP0x5c55c40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                                          RT_BITMAP0x5c571c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                                          RT_BITMAP0x5c58740x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                                          RT_BITMAP0x5c59cc0x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                                          RT_BITMAP0x5c5fb00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                                          RT_BITMAP0x5c60680x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                                          RT_BITMAP0x5c61d40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                                          RT_ICON0x5c63180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                          RT_ICON0x5c66000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                          RT_ICON0x5c67280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.5215759849906192
                                                          RT_MENU0x5c77d00xcdataChineseChina1.5
                                                          RT_MENU0x5c77dc0x284dataChineseChina0.5
                                                          RT_DIALOG0x5c7a600x98dataChineseChina0.7171052631578947
                                                          RT_DIALOG0x5c7af80x17adataChineseChina0.5185185185185185
                                                          RT_DIALOG0x5c7c740xfadataChineseChina0.696
                                                          RT_DIALOG0x5c7d700xeadataChineseChina0.6239316239316239
                                                          RT_DIALOG0x5c7e5c0x8aedataChineseChina0.39603960396039606
                                                          RT_DIALOG0x5c870c0xb2dataChineseChina0.7359550561797753
                                                          RT_DIALOG0x5c87c00xccdataChineseChina0.7647058823529411
                                                          RT_DIALOG0x5c888c0xb2dataChineseChina0.6629213483146067
                                                          RT_DIALOG0x5c89400xe2dataChineseChina0.6637168141592921
                                                          RT_DIALOG0x5c8a240x18cdataChineseChina0.5227272727272727
                                                          RT_STRING0x5c8bb00x50dataChineseChina0.85
                                                          RT_STRING0x5c8c000x2cdataChineseChina0.5909090909090909
                                                          RT_STRING0x5c8c2c0x78dataChineseChina0.925
                                                          RT_STRING0x5c8ca40x1c4dataChineseChina0.8141592920353983
                                                          RT_STRING0x5c8e680x12adataChineseChina0.5201342281879194
                                                          RT_STRING0x5c8f940x146dataChineseChina0.6288343558282209
                                                          RT_STRING0x5c90dc0x40dataChineseChina0.65625
                                                          RT_STRING0x5c911c0x64dataChineseChina0.73
                                                          RT_STRING0x5c91800x1d8dataChineseChina0.6758474576271186
                                                          RT_STRING0x5c93580x114dataChineseChina0.6376811594202898
                                                          RT_STRING0x5c946c0x24dataChineseChina0.4444444444444444
                                                          RT_GROUP_CURSOR0x5c94900x14dataChineseChina1.4
                                                          RT_GROUP_CURSOR0x5c94a40x14dataChineseChina1.4
                                                          RT_GROUP_CURSOR0x5c94b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                          RT_GROUP_CURSOR0x5c94cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                          RT_GROUP_CURSOR0x5c94e00x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                                          RT_GROUP_ICON0x5c95040x14data1.2
                                                          RT_GROUP_ICON0x5c95180x14dataChineseChina1.2
                                                          RT_GROUP_ICON0x5c952c0x14dataChineseChina1.25
                                                          RT_VERSION0x5c95400x20cdataChineseChina0.5534351145038168
                                                          RT_MANIFEST0x5c974c0x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                                          DLLImport
                                                          MSVFW32.dllDrawDibDraw
                                                          AVIFIL32.dllAVIStreamGetFrame, AVIStreamInfoA
                                                          iphlpapi.dllGetAdaptersInfo
                                                          WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, PlaySoundA
                                                          WS2_32.dllinet_ntoa, WSAStartup, WSACleanup, select, send, closesocket, WSAAsyncSelect, recvfrom, ioctlsocket, recv, getpeername, accept, ntohl
                                                          RASAPI32.dllRasGetConnectStatusA, RasHangUpA
                                                          KERNEL32.dllGetVersion, FileTimeToSystemTime, TerminateThread, VirtualAlloc, VirtualFree, CreateMutexA, ReleaseMutex, SuspendThread, InterlockedIncrement, InterlockedDecrement, LocalFree, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, lstrcmpiA, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, TlsAlloc, GlobalHandle, TlsFree, TlsSetValue, LocalReAlloc, TlsGetValue, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, GetACP, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetLastError, GetSystemDirectoryA, GetWindowsDirectoryA, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, MoveFileA, DeleteFileA, CopyFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, SetLocalTime, GetCommandLineA, GetTickCount, WaitForSingleObject, CloseHandle, InterlockedExchange, GetTimeZoneInformation
                                                          USER32.dllGetSysColorBrush, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, RegisterClassA, GetMenuItemCount, GetMenuItemID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, EndDialog, CreateDialogIndirectParamA, DestroyWindow, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, SetWindowTextA, GetForegroundWindow, UnregisterHotKey, RegisterHotKey, CreateWindowExA, CallWindowProcA, GetWindowTextA, GetDlgItem, GetClassNameA, GetDesktopWindow, DrawStateA, FrameRect, GetNextDlgTabItem, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, LoadStringA, CreateIconFromResource, IntersectRect, UnregisterClassA
                                                          GDI32.dllCreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreatePatternBrush, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, TranslateCharsetInfo, SaveDC, RestoreDC, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, CreateFontIndirectA, ExtSelectClipRgn, GetViewportExtEx, PtVisible, RectVisible, ExtTextOutA, Escape, GetTextMetricsA, SetDIBitsToDevice, SetTextColor, SetBkMode, TextOutA, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, CreateFontA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, GetTextExtentPoint32A, LineTo, SetPolyFillMode, GetDeviceCaps
                                                          WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                          comdlg32.dllChooseColorA, ChooseFontA, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
                                                          ADVAPI32.dllRegCreateKeyExA, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegCloseKey
                                                          SHELL32.dllDragAcceptFiles, DragQueryFileA, ShellExecuteA, Shell_NotifyIconA, SHGetSpecialFolderPathA, DragFinish
                                                          ole32.dllCLSIDFromProgID, OleInitialize, CLSIDFromString, CoCreateInstance, OleRun, OleUninitialize
                                                          OLEAUT32.dllVariantChangeType, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetDim, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantClear, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, UnRegisterTypeLib, VariantInit
                                                          COMCTL32.dllImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_Destroy, ImageList_Create, ImageList_BeginDrag, ImageList_DragShowNolock, _TrackMouseEvent, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_EndDrag, ImageList_Read, ImageList_Duplicate, ImageList_Add
                                                          WININET.dllInternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetConnectA, InternetSetOptionA, InternetOpenA, InternetCloseHandle, InternetCanonicalizeUrlA
                                                          Language of compilation systemCountry where language is spokenMap
                                                          ChineseChina
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-08T09:46:58.963117+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704103.235.47.188443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 09:46:57.714818954 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:57.714865923 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:57.714931011 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:57.716160059 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:57.716173887 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:58.962982893 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:58.963116884 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:58.963150978 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:58.964112043 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:58.973225117 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:58.973242044 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:58.973474979 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:59.023049116 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:59.067336082 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:59.348737001 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:59.348799944 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:59.348931074 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:59.350016117 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:59.350063086 CET44349704103.235.47.188192.168.2.5
                                                          Jan 8, 2025 09:46:59.350106955 CET49704443192.168.2.5103.235.47.188
                                                          Jan 8, 2025 09:46:59.350121975 CET44349704103.235.47.188192.168.2.5
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 8, 2025 09:46:57.703538895 CET5223053192.168.2.51.1.1.1
                                                          Jan 8, 2025 09:46:57.710165977 CET53522301.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 8, 2025 09:46:57.703538895 CET192.168.2.51.1.1.10x1723Standard query (0)www.baidu.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 8, 2025 09:46:57.710165977 CET1.1.1.1192.168.2.50x1723No error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 8, 2025 09:46:57.710165977 CET1.1.1.1192.168.2.50x1723No error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 8, 2025 09:46:57.710165977 CET1.1.1.1192.168.2.50x1723No error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                                                          Jan 8, 2025 09:46:57.710165977 CET1.1.1.1192.168.2.50x1723No error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549704103.235.47.1884436480C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-08 08:46:59 UTC271OUTHEAD / HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Connection: Keep-Alive
                                                          Accept: text/html, application/xhtml+xml, */*
                                                          Accept-Encoding: identity
                                                          Accept-Language: zh-cn
                                                          User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
                                                          Host: www.baidu.com
                                                          2025-01-08 08:46:59 UTC327INHTTP/1.1 200 OK
                                                          Accept-Ranges: bytes
                                                          Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
                                                          Content-Length: 277
                                                          Content-Type: text/html
                                                          Date: Wed, 08 Jan 2025 08:46:59 GMT
                                                          Etag: "575e1f6f-115"
                                                          Last-Modified: Mon, 13 Jun 2016 02:50:23 GMT
                                                          Pragma: no-cache
                                                          Server: bfe/1.0.8.18
                                                          Connection: close


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:03:46:57
                                                          Start date:08/01/2025
                                                          Path:C:\Users\user\Desktop\wRhEMj1swo.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\wRhEMj1swo.exe"
                                                          Imagebase:0x400000
                                                          File size:5'660'160 bytes
                                                          MD5 hash:D7AE3392A9CE8D10923040DD4C3EF0AF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.2125981168.00000000006F0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:3.3%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0.5%
                                                            Total number of Nodes:191
                                                            Total number of Limit Nodes:16
                                                            execution_graph 60260 5da5b4 RtlUnwind 60014 5d8f57 60017 5d8f69 60014->60017 60018 5d8f66 60017->60018 60020 5d8f70 60017->60020 60020->60018 60021 5d8f95 60020->60021 60022 5d8fc2 60021->60022 60026 5d9005 60021->60026 60028 5d8ff0 60022->60028 60039 5dfcb4 29 API calls 60022->60039 60024 5d8fd8 60040 5e1221 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 60024->60040 60025 5d9074 RtlAllocateHeap 60036 5d8ff7 60025->60036 60026->60028 60029 5d9027 60026->60029 60028->60025 60028->60036 60042 5dfcb4 29 API calls 60029->60042 60030 5d8fe3 60041 5d8ffc LeaveCriticalSection 60030->60041 60033 5d902e 60043 5e1cc4 6 API calls 60033->60043 60035 5d9041 60044 5d905b LeaveCriticalSection 60035->60044 60036->60020 60038 5d904e 60038->60028 60038->60036 60039->60024 60040->60030 60041->60028 60042->60033 60043->60035 60044->60038 60045 5d9e16 60055 5d9e4b 60045->60055 60046 5d9f31 60047 5d9f03 RtlAllocateHeap 60047->60055 60054 5d9ec5 60054->60047 60054->60055 60059 5dfcb4 29 API calls 60054->60059 60060 5e1cc4 6 API calls 60054->60060 60061 5d9f38 LeaveCriticalSection 60054->60061 60055->60046 60055->60047 60055->60054 60056 5dfcb4 29 API calls 60055->60056 60057 5e1221 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 60055->60057 60058 5d9eaf LeaveCriticalSection 60055->60058 60056->60055 60057->60055 60058->60055 60059->60054 60060->60054 60061->60054 60255 5dacb1 32 API calls 60062 5d7650 GetVersion 60094 5dd5f4 HeapCreate 60062->60094 60064 5d76ae 60065 5d76bb 60064->60065 60066 5d76b3 60064->60066 60106 5dd3b1 37 API calls 60065->60106 60114 5d777d 8 API calls 60066->60114 60069 5d76c0 60071 5d76cc 60069->60071 60072 5d76c4 60069->60072 60107 5dd1f5 34 API calls 60071->60107 60115 5d777d 8 API calls 60072->60115 60076 5d76d6 GetCommandLineA 60108 5dd0c3 37 API calls 60076->60108 60078 5d76e6 60116 5dce76 49 API calls 60078->60116 60080 5d76f0 60109 5dcdbd 48 API calls 60080->60109 60082 5d76f5 60083 5d76fa GetStartupInfoA 60082->60083 60110 5dcd65 48 API calls 60083->60110 60085 5d770c 60086 5d7715 60085->60086 60087 5d771e GetModuleHandleA 60086->60087 60111 5f29ed 60087->60111 60091 5d7739 60118 5dcbed 36 API calls 60091->60118 60093 5d774a 60095 5dd64a 60094->60095 60096 5dd614 60094->60096 60095->60064 60119 5dd4ac 57 API calls 60096->60119 60098 5dd619 60099 5dd630 60098->60099 60100 5dd623 60098->60100 60101 5dd64d 60099->60101 60121 5e19cc HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 60099->60121 60120 5e0e85 HeapAlloc 60100->60120 60101->60064 60103 5dd62d 60103->60101 60105 5dd63e HeapDestroy 60103->60105 60105->60095 60106->60069 60107->60076 60108->60078 60109->60082 60110->60085 60122 5fbaa4 60111->60122 60116->60080 60117 5daca0 32 API calls 60117->60091 60118->60093 60119->60098 60120->60103 60121->60103 60133 5fa805 60122->60133 60129 5d7730 60129->60117 60131 5fbaeb 60161 600bc2 68 API calls 60131->60161 60162 5ff4a6 60133->60162 60136 5fa816 60138 5ff480 60136->60138 60137 5ff480 65 API calls 60137->60136 60139 5ffa08 65 API calls 60138->60139 60140 5ff48f 60139->60140 60141 5fbab6 60140->60141 60191 5ffa9d 60140->60191 60143 600303 SetErrorMode SetErrorMode 60141->60143 60144 5ff480 65 API calls 60143->60144 60145 60031a 60144->60145 60146 5ff480 65 API calls 60145->60146 60147 600329 60146->60147 60148 60034f 60147->60148 60199 600366 60147->60199 60150 5ff480 65 API calls 60148->60150 60151 600354 60150->60151 60152 5fbace 60151->60152 60218 5fa81a 60151->60218 60152->60131 60154 5f5907 60152->60154 60155 5f5913 60154->60155 60157 5f591c 60154->60157 60155->60131 60156 5f5924 60242 5d7538 60156->60242 60157->60156 60159 5f5963 60157->60159 60249 5f57db 29 API calls 60159->60249 60161->60129 60163 5ff480 65 API calls 60162->60163 60164 5ff4ab 60163->60164 60167 5ffa08 60164->60167 60168 5ffa3e TlsGetValue 60167->60168 60169 5ffa11 60167->60169 60171 5ffa51 60168->60171 60170 5ffa2b 60169->60170 60188 5ff608 65 API calls 60169->60188 60178 5ff6a1 EnterCriticalSection 60170->60178 60173 5fa80a 60171->60173 60174 5ffa64 60171->60174 60173->60136 60173->60137 60189 5ff810 65 API calls 60174->60189 60176 5ffa3c 60176->60168 60183 5ff6c0 60178->60183 60179 5ff70d GlobalHandle GlobalUnlock GlobalReAlloc 60184 5ff72f 60179->60184 60180 5ff6fa GlobalAlloc 60180->60184 60181 5ff77c 60182 5ff791 LeaveCriticalSection 60181->60182 60182->60176 60183->60179 60183->60180 60183->60181 60185 5ff73d GlobalHandle GlobalLock LeaveCriticalSection 60184->60185 60186 5ff758 GlobalLock 60184->60186 60190 5f32da 65 API calls __EH_prolog 60185->60190 60186->60181 60188->60170 60189->60173 60190->60186 60192 5ffaa7 __EH_prolog 60191->60192 60193 5ffad5 60192->60193 60197 60077f 6 API calls 60192->60197 60193->60141 60195 5ffabe 60198 6007ef LeaveCriticalSection 60195->60198 60197->60195 60198->60193 60200 5ff480 65 API calls 60199->60200 60201 600379 GetModuleFileNameA 60200->60201 60229 5d9647 29 API calls 60201->60229 60203 6003ab 60230 600483 lstrlenA lstrcpynA 60203->60230 60205 6003c7 60206 6003dd 60205->60206 60235 5dbe8d 29 API calls 60205->60235 60217 600417 60206->60217 60231 5fb616 60206->60231 60209 60042f lstrcpyA 60237 5dbe8d 29 API calls 60209->60237 60211 600459 lstrcatA 60238 5dbe8d 29 API calls 60211->60238 60212 600477 60212->60148 60215 60044a 60215->60211 60215->60212 60217->60209 60217->60215 60219 5ff480 65 API calls 60218->60219 60220 5fa81f 60219->60220 60221 5fa877 60220->60221 60239 5ff24e 60220->60239 60221->60152 60224 5ffa9d 7 API calls 60225 5fa855 60224->60225 60226 5fa862 60225->60226 60228 5ff480 65 API calls 60225->60228 60227 5ffa08 65 API calls 60226->60227 60227->60221 60228->60226 60229->60203 60230->60205 60232 5ff480 65 API calls 60231->60232 60233 5fb61c LoadStringA 60232->60233 60234 5fb637 60233->60234 60236 5dbe8d 29 API calls 60234->60236 60235->60206 60236->60217 60237->60215 60238->60212 60240 5ffa08 65 API calls 60239->60240 60241 5fa82b GetCurrentThreadId SetWindowsHookExA 60240->60241 60241->60224 60250 5db148 60242->60250 60244 5d7542 EnterCriticalSection 60245 5d7591 LeaveCriticalSection 60244->60245 60246 5d7560 60244->60246 60245->60155 60251 5f52c4 29 API calls 60246->60251 60248 5d7572 60248->60245 60249->60155 60250->60244 60251->60248 60264 5fab72 66 API calls 59991 5d8e6e 59992 5d8e9c 59991->59992 59993 5d8f48 59991->59993 59994 5d8ea6 59992->59994 59995 5d8ee1 59992->59995 60008 5dfcb4 29 API calls 59994->60008 60005 5d8ed2 59995->60005 60011 5dfcb4 29 API calls 59995->60011 59997 5d8f3a RtlFreeHeap 59997->59993 59999 5d8ec7 60010 5d8ed8 LeaveCriticalSection 59999->60010 60000 5d8ead 60000->59999 60009 5e0ef8 VirtualFree VirtualFree HeapFree 60000->60009 60002 5d8eed 60003 5d8f19 60002->60003 60012 5e1c7f VirtualFree HeapFree VirtualFree 60002->60012 60013 5d8f30 LeaveCriticalSection 60003->60013 60005->59993 60005->59997 60008->60000 60009->59999 60010->60005 60011->60002 60012->60003 60013->60005 60259 5fed89 65 API calls __EH_prolog 60261 42165a GetPEB GetPEB 60265 434798 GetPEB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 43e91f5658e9c6bdc4b122ac241575454e0efba38d0e65e7341f6a4c2de222da
                                                            • Instruction ID: cb2145ec05dfb67c699404afd3450a093bca2c7e454c731c957cacca2c279613
                                                            • Opcode Fuzzy Hash: 43e91f5658e9c6bdc4b122ac241575454e0efba38d0e65e7341f6a4c2de222da
                                                            • Instruction Fuzzy Hash: 2D0252B1A402169BFB00DF58ECC179AB7B1FF59324F280475E906AB381D379B951CB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a32d5af4d972bfee726ceb9e89cbc4e1c7d499818ae25d7447f144db315e6365
                                                            • Instruction ID: 95d3b870bcb6fef589d624824f285a6dfde7cca0d58eb0d5bed38eb91d277166
                                                            • Opcode Fuzzy Hash: a32d5af4d972bfee726ceb9e89cbc4e1c7d499818ae25d7447f144db315e6365
                                                            • Instruction Fuzzy Hash: 3C7163B1E40309ABEF10DB949D87BDF7AB8BF14711F140425F604BB2C1E6B66A508B66

                                                            Control-flow Graph

                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(009BBDA0,009BBD74,00000000,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF6B0
                                                            • GlobalAlloc.KERNEL32(00002002,00000000,?,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF705
                                                            • GlobalHandle.KERNEL32(00A125E0), ref: 005FF70E
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 005FF717
                                                            • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 005FF729
                                                            • GlobalHandle.KERNEL32(00A125E0), ref: 005FF740
                                                            • GlobalLock.KERNEL32(00000000), ref: 005FF747
                                                            • LeaveCriticalSection.KERNEL32(0w],?,?,009BBD84,009BBD84,005FFA3C,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF,?,00000000), ref: 005FF74D
                                                            • GlobalLock.KERNEL32(00000000), ref: 005FF75C
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 005FF7A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                            • String ID: 0w]
                                                            • API String ID: 2667261700-2928606970
                                                            • Opcode ID: 14a836d19322825eb98e50977cbab833775139a0b03f3b30fda316f9b2db858e
                                                            • Instruction ID: e4875093aeb34c1d1859b7ac233102ab66a60a198e2d70f333e85c5cf3fdfa25
                                                            • Opcode Fuzzy Hash: 14a836d19322825eb98e50977cbab833775139a0b03f3b30fda316f9b2db858e
                                                            • Instruction Fuzzy Hash: 6E3152756447099FE7249F28DC89A2BBBEAFF44301B01492DF962C3A61E775F9048B50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 410 600303-60032e SetErrorMode * 2 call 5ff480 * 2 415 600330-60034a call 600366 410->415 416 60034f-600359 call 5ff480 410->416 415->416 420 600360-600363 416->420 421 60035b call 5fa81a 416->421 421->420
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000000,00000000,005FBACE,00000000,00000000,00000000,00000000,?,00000000,?,005F2A02,00000000,00000000,00000000,00000000,005D7730), ref: 0060030C
                                                            • SetErrorMode.KERNEL32(00000000,?,00000000,?,005F2A02,00000000,00000000,00000000,00000000,005D7730,00000000), ref: 00600313
                                                              • Part of subcall function 00600366: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 00600397
                                                              • Part of subcall function 00600366: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00600438
                                                              • Part of subcall function 00600366: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 00600465
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                                            • String ID: 0w]
                                                            • API String ID: 3389432936-2928606970
                                                            • Opcode ID: 47e4f9777f6a79a288a2dea7bea5aa65c4acc3ef56cddde84d818b1dead3bc02
                                                            • Instruction ID: 1dc92e5776812a81564c81046c9759732a25e12866b477459d5017e929169995
                                                            • Opcode Fuzzy Hash: 47e4f9777f6a79a288a2dea7bea5aa65c4acc3ef56cddde84d818b1dead3bc02
                                                            • Instruction Fuzzy Hash: 6BF0AF709142158FD719EF24D409B1B7BD5BF88710F05845EF0488B3A2CB74D800CB96

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 804 5dd5f4-5dd612 HeapCreate 805 5dd64a-5dd64c 804->805 806 5dd614-5dd621 call 5dd4ac 804->806 809 5dd630-5dd633 806->809 810 5dd623-5dd62e call 5e0e85 806->810 811 5dd64d-5dd650 809->811 812 5dd635 call 5e19cc 809->812 816 5dd63a-5dd63c 810->816 812->816 816->811 817 5dd63e-5dd644 HeapDestroy 816->817 817->805
                                                            APIs
                                                            • HeapCreate.KERNEL32(00000000,00001000,00000000,005D76AE,00000001), ref: 005DD605
                                                              • Part of subcall function 005DD4AC: GetVersionExA.KERNEL32 ref: 005DD4CB
                                                            • HeapDestroy.KERNEL32 ref: 005DD644
                                                              • Part of subcall function 005E0E85: HeapAlloc.KERNEL32(00000000,00000140,005DD62D,000003F8), ref: 005E0E92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocCreateDestroyVersion
                                                            • String ID:
                                                            • API String ID: 2507506473-0
                                                            • Opcode ID: ee9f81f39e98385bde099ac8dc098cacc9890575f16db357e8c92dc1698a566f
                                                            • Instruction ID: f51865484d63e975acad0fd8690db07e25b02cc39a601c185f58abc0afb40669
                                                            • Opcode Fuzzy Hash: ee9f81f39e98385bde099ac8dc098cacc9890575f16db357e8c92dc1698a566f
                                                            • Instruction Fuzzy Hash: 35F06570D59202EADB706B385D46B352DB4BBC0741F140467F545C92E4EAB0C580E972

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 818 5fa81a-5fa823 call 5ff480 821 5fa878 818->821 822 5fa825-5fa850 call 5ff24e GetCurrentThreadId SetWindowsHookExA call 5ffa9d 818->822 826 5fa855-5fa85b 822->826 827 5fa85d-5fa862 call 5ff480 826->827 828 5fa868-5fa877 call 5ffa08 826->828 827->828 828->821
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 005FA82D
                                                            • SetWindowsHookExA.USER32(000000FF,005FAB72,00000000,00000000), ref: 005FA83D
                                                              • Part of subcall function 005FFA9D: __EH_prolog.LIBCMT ref: 005FFAA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentH_prologHookThreadWindows
                                                            • String ID:
                                                            • API String ID: 2183259885-0
                                                            • Opcode ID: 0c2c1aa7fc58c9d56cbeeb8ef714bf320bdc978e384402e41bddc0c42901e30d
                                                            • Instruction ID: f5ed20bf61019511605a88c4788485b709784f6c60d40d311a46a49e7abb285c
                                                            • Opcode Fuzzy Hash: 0c2c1aa7fc58c9d56cbeeb8ef714bf320bdc978e384402e41bddc0c42901e30d
                                                            • Instruction Fuzzy Hash: 87F082719406095AD7302BB0AC0DBBA2E91BF44710F010664F756565E1C6A8AC80C362

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1491 5d9e16-5d9e49 1492 5d9e5f 1491->1492 1493 5d9e4b-5d9e4f 1491->1493 1496 5d9e61-5d9e67 1492->1496 1494 5d9e54-5d9e5d 1493->1494 1495 5d9e51-5d9e53 1493->1495 1494->1496 1495->1494 1497 5d9e6d-5d9e75 1496->1497 1498 5d9f15-5d9f18 1496->1498 1501 5d9eb8-5d9ebb 1497->1501 1502 5d9e77-5d9e80 1497->1502 1499 5d9f1a-5d9f20 1498->1499 1500 5d9f41 1498->1500 1499->1500 1503 5d9f22-5d9f2b call 5e2099 1499->1503 1506 5d9f44-5d9f52 1500->1506 1504 5d9ebd-5d9ec3 1501->1504 1505 5d9efe-5d9f01 1501->1505 1502->1505 1507 5d9e82-5d9ea3 call 5dfcb4 call 5e1221 call 5d9eaf 1502->1507 1503->1496 1516 5d9f31 1503->1516 1504->1505 1510 5d9ec5-5d9eef call 5dfcb4 call 5e1cc4 call 5d9f38 1504->1510 1505->1500 1508 5d9f03-5d9f12 RtlAllocateHeap 1505->1508 1507->1508 1524 5d9ea5-5d9ea8 1507->1524 1508->1498 1510->1508 1527 5d9ef1 1510->1527 1516->1506 1526 5d9ef2-5d9efb call 5db200 1524->1526 1526->1505 1527->1526
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005D9F0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 4a4e00daba088b312a59f1e63b1d627a9e119932e2158916c2e3a2ad72ae283b
                                                            • Instruction ID: 2295377f52eeddbdbb6692e29cfe38e717927bd603d5e5ec95010e135b5468a9
                                                            • Opcode Fuzzy Hash: 4a4e00daba088b312a59f1e63b1d627a9e119932e2158916c2e3a2ad72ae283b
                                                            • Instruction Fuzzy Hash: E6316D72D0426AAACF30EFAC9C8569EBB78FB44720F10422BE825B63D1C7745940DB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1530 5d8f95-5d8fc0 1531 5d9005-5d9008 1530->1531 1532 5d8fc2-5d8fcb 1530->1532 1533 5d900a-5d900f 1531->1533 1534 5d9064-5d9069 1531->1534 1532->1534 1535 5d8fd1-5d8ff5 call 5dfcb4 call 5e1221 call 5d8ffc 1532->1535 1539 5d9019-5d901b 1533->1539 1540 5d9011-5d9017 1533->1540 1537 5d906e-5d9073 1534->1537 1538 5d906b-5d906d 1534->1538 1535->1534 1555 5d8ff7 1535->1555 1542 5d9074-5d907c RtlAllocateHeap 1537->1542 1538->1537 1543 5d901c-5d9025 1539->1543 1540->1543 1545 5d9082-5d9090 1542->1545 1546 5d9055-5d9056 1543->1546 1547 5d9027-5d9053 call 5dfcb4 call 5e1cc4 call 5d905b 1543->1547 1546->1542 1547->1545 1547->1546 1555->1545
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 005D907C
                                                              • Part of subcall function 005DFCB4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFCF1
                                                              • Part of subcall function 005DFCB4: EnterCriticalSection.KERNEL32(?,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFD0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                            • String ID:
                                                            • API String ID: 1616793339-0
                                                            • Opcode ID: 8ec08ea2c924c909b59c300af9342ff282d32ebe7c11619cd78ce379eeaf0e38
                                                            • Instruction ID: 09522eea6c53038dc6314c9c2b0df1236d70be449a201506881ef74c61323e33
                                                            • Opcode Fuzzy Hash: 8ec08ea2c924c909b59c300af9342ff282d32ebe7c11619cd78ce379eeaf0e38
                                                            • Instruction Fuzzy Hash: 8721A332A04245EBDB30EB6DAC4AB9A7BA4FB00720F144127F514EB3D0C774A941DA55

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1558 5d8e6e-5d8e96 1559 5d8e9c-5d8ea4 1558->1559 1560 5d8f48-5d8f56 1558->1560 1561 5d8ea6-5d8ebe call 5dfcb4 call 5e0ecd 1559->1561 1562 5d8ee1-5d8ee4 1559->1562 1574 5d8ec9-5d8ed6 call 5d8ed8 1561->1574 1575 5d8ec0-5d8ec8 call 5e0ef8 1561->1575 1563 5d8f39 1562->1563 1564 5d8ee6-5d8f0b call 5dfcb4 call 5e1c28 1562->1564 1566 5d8f3a-5d8f42 RtlFreeHeap 1563->1566 1577 5d8f0d-5d8f19 call 5e1c7f 1564->1577 1578 5d8f1c-5d8f25 call 5d8f30 1564->1578 1566->1560 1584 5d8f29 1574->1584 1575->1574 1577->1578 1578->1584 1584->1560 1587 5d8f2b-5d8f2e 1584->1587 1587->1566
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,00000000,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074), ref: 005D8F42
                                                              • Part of subcall function 005DFCB4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFCF1
                                                              • Part of subcall function 005DFCB4: EnterCriticalSection.KERNEL32(?,?,?,005D9ECC,00000009,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005DFD0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$EnterFreeHeapInitialize
                                                            • String ID:
                                                            • API String ID: 641406236-0
                                                            • Opcode ID: 04b427a55df56949080c880f240842ec9d895abdb337ec261fcf515ca9117cbf
                                                            • Instruction ID: 1447a8390f272f1d4d8db05219eb5a1331b5a87278219865f92cd809b0c012bd
                                                            • Opcode Fuzzy Hash: 04b427a55df56949080c880f240842ec9d895abdb337ec261fcf515ca9117cbf
                                                            • Instruction Fuzzy Hash: 9721C27294560AEADF20AB999C06BAE7F79FB45720F240527F410E23D0DB748940CAA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1588 5fb616-5fb635 call 5ff480 LoadStringA 1591 5fb639-5fb63a 1588->1591 1592 5fb637 1588->1592 1592->1591
                                                            APIs
                                                            • LoadStringA.USER32(?,?,?,?), ref: 005FB62D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LoadString
                                                            • String ID:
                                                            • API String ID: 2948472770-0
                                                            • Opcode ID: 82a880801e5d08906efaa71aee530ab6f1199bf736357138b4e2b1e52b71859b
                                                            • Instruction ID: 566ca7b208f0e282238efe5439be3387d1b48e5e3a7ef24473bfca7a846deded
                                                            • Opcode Fuzzy Hash: 82a880801e5d08906efaa71aee530ab6f1199bf736357138b4e2b1e52b71859b
                                                            • Instruction Fuzzy Hash: 99D0A9724593A39BCB01DF64D80CD9FBFA8BF98320B094C4DF59083211C328E844CB62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \main$\main\corn$\main\corn\libeay32.dll$\main\corn\sqlite3.dll$\main\corn\zlib.dll$\main\data$\main\data\app$\main\data\app\!tmp.xlz$\main\data\pack$\main\data\pack\origin$\main\data\plugin$\main\data\versiondownload$\main\plugin$\main\wke$\main\wke\$\main\work_plugin_tmp$\main\work_plugin_tmp\
                                                            • API String ID: 0-1824072935
                                                            • Opcode ID: cce16c0dc29e8666691254cd87ae415d179acc0e7e2869831ec293002b5af1ca
                                                            • Instruction ID: 26c4af1515f830f3e269d3404704aa3efc9029cf975fead263daa6ae651b8f83
                                                            • Opcode Fuzzy Hash: cce16c0dc29e8666691254cd87ae415d179acc0e7e2869831ec293002b5af1ca
                                                            • Instruction Fuzzy Hash: 7A6260B1F4030477EB50AAA19CC3F6F7AA5EF54704F044079FB05BA3C2E6B6AA508755
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,005DD7AE,?,Microsoft Visual C++ Runtime Library,00012010,?,00860CFC,?,00860D4C,?,?,?,Runtime Error!Program: ), ref: 005E4C32
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 005E4C4A
                                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 005E4C5B
                                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 005E4C68
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                            • API String ID: 2238633743-4044615076
                                                            • Opcode ID: e1390d88d63d0e02cca65ee5f025441b1b0106c97e04a45066dec27e20cf2b62
                                                            • Instruction ID: de4fbce00d682f29a0ce494114c779e92a484c627ae46b0b14b4045c67234134
                                                            • Opcode Fuzzy Hash: e1390d88d63d0e02cca65ee5f025441b1b0106c97e04a45066dec27e20cf2b62
                                                            • Instruction Fuzzy Hash: BB01B571614351AF87109FB79E889277EDAFA887603150469B54AC3221DAB49C00BF30
                                                            APIs
                                                            • GetVersionExA.KERNEL32 ref: 005DD4CB
                                                            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 005DD500
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 005DD560
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnvironmentFileModuleNameVariableVersion
                                                            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                            • API String ID: 1385375860-4131005785
                                                            • Opcode ID: fa03274e213e86f904198252615b5b51fb8a0383b59c7726dc10a3f852e706d4
                                                            • Instruction ID: 943668c1126a5bbfb7c16b57ccec6431720ccca8c3bfcde4f5e3552d89214658
                                                            • Opcode Fuzzy Hash: fa03274e213e86f904198252615b5b51fb8a0383b59c7726dc10a3f852e706d4
                                                            • Instruction Fuzzy Hash: F331F6719452886EEB35867C7C45BE97F78BB02308F6404DBE185DA342E6709E89CB31
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: b917172686b5d614e026440cdc05949f0510fa4c7c16ac5965b68feb5ee08fe6
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 9D112B64A10208DBEB00DFA4D580BAFB375FF5C700F105069D608EB395E77A9E10C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 4b9d438164f6e2214db0c9e65cd9984ff7cee6f9638b44ee477d6fad7f2157df
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 6E112B64A10209D7EB00CFA4D580BAFB376FF5C700F105069D908EB395E77A9E10C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 4dad3647fca4719f91576c2b966fa23797f4e4dcffaba2399a2060a7f383dc43
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: 20112B64A10208D7EB00CFA4D580BAFB375FF6C700F105069D908EB395E77A9E51C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction ID: 2fefb3e5dec1af4fac95c34bb9b0853e4fc8bd943c71c77400ee65158f1d5662
                                                            • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                            • Instruction Fuzzy Hash: AE111964A10208D7EB00DFA5D580BAFB375FF2C700F105069D508EB395E77A9E11C7AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66ad7dfa48c239ea3d0e4e6a6947198e39da5d0cc551757ff1b228b18c1839d9
                                                            • Instruction ID: 5c3b48c2abf1ef263d97beb9245c49f927de98a4584c7822c65cdc96364cf23e
                                                            • Opcode Fuzzy Hash: 66ad7dfa48c239ea3d0e4e6a6947198e39da5d0cc551757ff1b228b18c1839d9
                                                            • Instruction Fuzzy Hash: 49113C78A45318EFCB11CF59E9C0A89BBB0FF1E310B5154A9DA489B306D3706E50EB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                            • Instruction ID: d69b516b65d026ecdfe2c868a76ccb602657c2c5d6c07752d9e3d3657f5cfb13
                                                            • Opcode Fuzzy Hash: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                            • Instruction Fuzzy Hash: 8FD0C934250749CFDB01CF14C0E2B41B3A8EB89B58F108071DD419B345D2B8F945CAA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f257f19965b87bcb6f7454717a867be4e02cacbce74783232d48ec6df0bfb573
                                                            • Instruction ID: 431d3468442b92c2cdb8e9e687ab02f782d16e4631adfba4a2873e85dca12162
                                                            • Opcode Fuzzy Hash: f257f19965b87bcb6f7454717a867be4e02cacbce74783232d48ec6df0bfb573
                                                            • Instruction Fuzzy Hash: FFB0121630810517F300004FEC41702718DC3C426CF44C060A005E2381E083EC0001A0
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD0DE
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD0F2
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD11E
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD156
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD178
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,005D76E6), ref: 005DD191
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005D76E6), ref: 005DD1A4
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 005DD1E2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                            • String ID: v]
                                                            • API String ID: 1823725401-2291034021
                                                            • Opcode ID: e63f48da157bcda2c4ac90e8bbbb8e7fe552414e3e559f0ff1665d52e1c84d81
                                                            • Instruction ID: 44a1fbb1b994fbf6a949b6afa0a61ca7f9344a5ae7da90bb61b5ea80c1978c2a
                                                            • Opcode Fuzzy Hash: e63f48da157bcda2c4ac90e8bbbb8e7fe552414e3e559f0ff1665d52e1c84d81
                                                            • Instruction Fuzzy Hash: A631A3B29092666FDB307BFC9C8883BBEBDF686358B15092BF955C3300E6615D45C2B1
                                                            APIs
                                                            • LCMapStringW.KERNEL32(00000000,00000100,00860F7C,00000001,00000000,00000000,7591E860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0BF6
                                                            • LCMapStringA.KERNEL32(00000000,00000100,00860F78,00000001,00000000,00000000,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E0C12
                                                            • LCMapStringA.KERNEL32(?,?,?,005D942D,?,?,7591E860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0C5B
                                                            • MultiByteToWideChar.KERNEL32(?,009C00A5,?,005D942D,00000000,00000000,7591E860,009C00A4,?,?,?,005D942D,?,?,?,00000000), ref: 005E0C93
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,?,005D942D,?,00000000,?,?,005D942D,?), ref: 005E0CEB
                                                            • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,005D942D,?), ref: 005E0D01
                                                            • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,005D942D,?), ref: 005E0D34
                                                            • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,005D942D,?), ref: 005E0D9C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: String$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 352835431-0
                                                            • Opcode ID: adff8b6602b683eecb763217cde7e0ccfa3a80c8f3106b84fa1ea256d63c0365
                                                            • Instruction ID: 1fce51368f76eb600062a1e878e49cf749de96192f7671c4da9e7cef5d0361e0
                                                            • Opcode Fuzzy Hash: adff8b6602b683eecb763217cde7e0ccfa3a80c8f3106b84fa1ea256d63c0365
                                                            • Instruction Fuzzy Hash: E6519C71900289EBCF228F95CE45EEF7FB9FB48750F205219F954A61A0D3B1AD90DB60
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 005DD6F7
                                                            • GetStdHandle.KERNEL32(000000F4,00860CFC,00000000,00000000,00000000,?), ref: 005DD7CD
                                                            • WriteFile.KERNEL32(00000000), ref: 005DD7D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$HandleModuleNameWrite
                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                            • API String ID: 3784150691-4022980321
                                                            • Opcode ID: 3477663a78481da2145b23645d776c95fe424290794b95652a2bcb580411782f
                                                            • Instruction ID: 490313afeb54315750d49439658081c5b307ba026fe74bc99ab2ff5815c0e36c
                                                            • Opcode Fuzzy Hash: 3477663a78481da2145b23645d776c95fe424290794b95652a2bcb580411782f
                                                            • Instruction Fuzzy Hash: 6331E672A00218AFDF34E6A4CD49FAA3BBDFB81300F501597F544E6281E670AA848F61
                                                            APIs
                                                            • GetStringTypeW.KERNEL32(00000001,00860F7C,00000001,?,7591E860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E4389
                                                            • GetStringTypeA.KERNEL32(00000000,00000001,00860F78,00000001,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E43A3
                                                            • GetStringTypeA.KERNEL32(?,?,?,?,005D942D,7591E860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E43D7
                                                            • MultiByteToWideChar.KERNEL32(?,009C00A5,?,?,00000000,00000000,7591E860,009C00A4,?,?,005D942D,?,?,?,00000000,00000001), ref: 005E440F
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,005D942D,?), ref: 005E4465
                                                            • GetStringTypeW.KERNEL32(?,?,00000000,005D942D,?,?,?,?,?,?,005D942D,?), ref: 005E4477
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: StringType$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 3852931651-0
                                                            • Opcode ID: 5deb1587c8aa3ac978f4e12739704dd0cfc3abfd689b95beb43a99dfb15dda5e
                                                            • Instruction ID: 394e11ce305d34699af0339132734e3aa4eeaaac1cb23251ffc25468070425e2
                                                            • Opcode Fuzzy Hash: 5deb1587c8aa3ac978f4e12739704dd0cfc3abfd689b95beb43a99dfb15dda5e
                                                            • Instruction Fuzzy Hash: BE416D72A40299EFCF209F95DC89AAF7FB9FB18750F10491AFA51D2290C3349950DBA0
                                                            APIs
                                                            • TlsGetValue.KERNEL32(009BBD84,009BBD74,00000000,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF81B
                                                            • EnterCriticalSection.KERNEL32(009BBDA0,00000010,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF86A
                                                            • LeaveCriticalSection.KERNEL32(009BBDA0,00000000,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF87D
                                                            • LocalAlloc.KERNEL32(00000000,00000005,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF893
                                                            • LocalReAlloc.KERNEL32(?,00000005,00000002,?,009BBD84,?,005FFA78,009BBD74,00000000,?,00000000,005FF48F,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 005FF8A5
                                                            • TlsSetValue.KERNEL32(009BBD84,00000000), ref: 005FF8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocCriticalLocalSectionValue$EnterLeave
                                                            • String ID:
                                                            • API String ID: 4117633390-0
                                                            • Opcode ID: e1dca5834538845a6832ef52dd5ad30bd93259b6ae781085200fb12343fbce57
                                                            • Instruction ID: d34c16330a939a668798d1364149905177e11a213c539be323633408254a3631
                                                            • Opcode Fuzzy Hash: e1dca5834538845a6832ef52dd5ad30bd93259b6ae781085200fb12343fbce57
                                                            • Instruction Fuzzy Hash: 74318C31500609EFE724CF54C899F6ABBA9FF84360F008629F616C7A50E734F905CBA0
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 00600397
                                                              • Part of subcall function 00600483: lstrlenA.KERNEL32(00000104,00000000,?,006003C7), ref: 006004BA
                                                            • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00600438
                                                            • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 00600465
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileModuleNamelstrcatlstrcpylstrlen
                                                            • String ID: .HLP$.INI
                                                            • API String ID: 2421895198-3011182340
                                                            • Opcode ID: 1a4bd1553bb18208485cb963076845060f068ef80e1d30a7f3b4df79ae0796a4
                                                            • Instruction ID: ca9d46c6d654c8e0c68d7634694f7d9c9df430897e786ef552aa4c2374b1e95b
                                                            • Opcode Fuzzy Hash: 1a4bd1553bb18208485cb963076845060f068ef80e1d30a7f3b4df79ae0796a4
                                                            • Instruction Fuzzy Hash: EA317CB5844709DFEB24DB74D888BC7B7EDFB08300F10496AE299D3281DB74A9808B90
                                                            APIs
                                                            • GetStartupInfoA.KERNEL32(?), ref: 005DD253
                                                            • GetFileType.KERNEL32(?,?,00000000), ref: 005DD2FE
                                                            • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 005DD361
                                                            • GetFileType.KERNEL32(00000000,?,00000000), ref: 005DD36F
                                                            • SetHandleCount.KERNEL32 ref: 005DD3A6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileHandleType$CountInfoStartup
                                                            • String ID:
                                                            • API String ID: 1710529072-0
                                                            • Opcode ID: 61ac8dbe7b3e49b3282e4fe6dafd815620d22f25a7b6f6b2d0f7e8bd7d942488
                                                            • Instruction ID: 05fd84a3848206fa4a9ec357fa2059fc16d0a78af726c087a73e38d92a0bf690
                                                            • Opcode Fuzzy Hash: 61ac8dbe7b3e49b3282e4fe6dafd815620d22f25a7b6f6b2d0f7e8bd7d942488
                                                            • Instruction Fuzzy Hash: E951D371908202CFC730CB2CC888B697FB0BB51364F298A6BD5A69B3E1D730D945C762
                                                            APIs
                                                            • GetLastError.KERNEL32(00000103,7FFFFFFF,005D9A22,005DC2D8,00000000,?,?,00000000,00000001), ref: 005DD41A
                                                            • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 005DD428
                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 005DD474
                                                              • Part of subcall function 005D9E16: RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005DD43D,00000001,00000074,?,?,00000000,00000001), ref: 005D9F0C
                                                            • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 005DD44C
                                                            • GetCurrentThreadId.KERNEL32 ref: 005DD45D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastValue$AllocateCurrentHeapThread
                                                            • String ID:
                                                            • API String ID: 2047054392-0
                                                            • Opcode ID: 298ff72e5404d0feb93b0c30fef02af1e5626a445150cb8d07b75657c79bbe54
                                                            • Instruction ID: 386ebc68ed5a8ef154abcd70a4e6158382be9351ea63529ae7c314bf4bd13e5a
                                                            • Opcode Fuzzy Hash: 298ff72e5404d0feb93b0c30fef02af1e5626a445150cb8d07b75657c79bbe54
                                                            • Instruction Fuzzy Hash: 50F0F032948722ABDB302F38BC0D65A3F61FF41B72B10461BF951962A0CF70A841A7A0
                                                            APIs
                                                            • HeapAlloc.KERNEL32(00000000,00002020,0095D630,0095D630,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E19ED
                                                            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E1A11
                                                            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000), ref: 005E1A2B
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000,?), ref: 005E1AEC
                                                            • HeapFree.KERNEL32(00000000,00000000,?,?,005E1E98,00000000,00000010,00000000,00000009,00000009,?,005D9041,00000010,00000000,?,00000000), ref: 005E1B03
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual$FreeHeap
                                                            • String ID:
                                                            • API String ID: 714016831-0
                                                            • Opcode ID: ba81a3e1d532537e0d90a06d2c78681f1c5f2f3b36023a7d5f6fa9d71c76aec9
                                                            • Instruction ID: 42f027b26e4ec1c66c6bdc23522626e8f7a632078cb100c2467eaba4925fc80d
                                                            • Opcode Fuzzy Hash: ba81a3e1d532537e0d90a06d2c78681f1c5f2f3b36023a7d5f6fa9d71c76aec9
                                                            • Instruction Fuzzy Hash: 8A310171643B46DBD334CF2ADC40B26BBE4FB44751F10463AE599972D0E770A884DB88
                                                            APIs
                                                            • GetVersion.KERNEL32 ref: 005D7676
                                                              • Part of subcall function 005DD5F4: HeapCreate.KERNEL32(00000000,00001000,00000000,005D76AE,00000001), ref: 005DD605
                                                              • Part of subcall function 005DD5F4: HeapDestroy.KERNEL32 ref: 005DD644
                                                            • GetCommandLineA.KERNEL32 ref: 005D76D6
                                                            • GetStartupInfoA.KERNEL32(?), ref: 005D7701
                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 005D7724
                                                              • Part of subcall function 005D777D: ExitProcess.KERNEL32 ref: 005D779A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                            • String ID:
                                                            • API String ID: 2057626494-0
                                                            • Opcode ID: 4f90bdbaab5436fa3481b3a853eefced6ebebb898f9e995c062764fd17b0a8c9
                                                            • Instruction ID: 28382f7c6ba52da0fc9470a6f1af113f0cbebce2947f8b77c1b73987b66654ba
                                                            • Opcode Fuzzy Hash: 4f90bdbaab5436fa3481b3a853eefced6ebebb898f9e995c062764fd17b0a8c9
                                                            • Instruction Fuzzy Hash: C42193B185860A9BD728AFAC9C49A6E7F79FB45711F10052BF801AA3A1EB744840CB61
                                                            APIs
                                                            • GetCPInfo.KERNEL32(?,00000000), ref: 005DC58D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID: $
                                                            • API String ID: 1807457897-3032137957
                                                            • Opcode ID: fbf2d55d1992b2828341290ee368b2b0097591ab566d181a6b4a3f829bcea1c1
                                                            • Instruction ID: 2c63d1f4cdd37fc31a6556ad44406ea7d4b948badd6e4a697e2d24fb48ba51b6
                                                            • Opcode Fuzzy Hash: fbf2d55d1992b2828341290ee368b2b0097591ab566d181a6b4a3f829bcea1c1
                                                            • Instruction Fuzzy Hash: 01413A314082999BEB26872CDC4DFFB7F99BB46704F1814D7E185D7293C2718A44DB62
                                                            APIs
                                                            • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,005E12F2,00000000,00000000,00000000,005D8FE3,00000000,00000000,?,00000000,00000000,00000000), ref: 005E1552
                                                            • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,005E12F2,00000000,00000000,00000000,005D8FE3,00000000,00000000,?,00000000,00000000,00000000), ref: 005E1586
                                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 005E15A0
                                                            • HeapFree.KERNEL32(00000000,?), ref: 005E15B7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocHeap$FreeVirtual
                                                            • String ID:
                                                            • API String ID: 3499195154-0
                                                            • Opcode ID: df78756c7a05a62308931e25ee23a5f4508a8533a6b5e18d90e139d77e79bd16
                                                            • Instruction ID: e2a0f356ed66ca4fc86a221981e89018d853a520857c077296c063ecea21e913
                                                            • Opcode Fuzzy Hash: df78756c7a05a62308931e25ee23a5f4508a8533a6b5e18d90e139d77e79bd16
                                                            • Instruction Fuzzy Hash: BA115830A08700EFD764CF19EC85E227BB2FBC5720B114A1AE5A2C21F0C330A945EF10
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(009BBF48,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007BA
                                                            • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007CC
                                                            • LeaveCriticalSection.KERNEL32(009BBF48,?,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB), ref: 006007D5
                                                            • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB,005FA80A), ref: 006007E7
                                                              • Part of subcall function 006006EC: GetVersion.KERNEL32(?,0060078F,?,005FFABE,00000010,?,00000000,?,?,?,005FF4A5,005FF508,005FED89,005FF4AB,005FA80A,005FBAAF), ref: 006006FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$Enter$InitializeLeaveVersion
                                                            • String ID:
                                                            • API String ID: 1193629340-0
                                                            • Opcode ID: 61d0ed3ea336d5170fed718c0ebdc8c6f569a0c0c731bc1147ae36bf2bdedb18
                                                            • Instruction ID: cdf30a1604c954d203961bd91cbc315bc7a298ca3c130c6cabe5229e7129eaf1
                                                            • Opcode Fuzzy Hash: 61d0ed3ea336d5170fed718c0ebdc8c6f569a0c0c731bc1147ae36bf2bdedb18
                                                            • Instruction Fuzzy Hash: 24F0AF7145820EDFDB14AF64ECC0AA7B3AEFB10326F00113AEA01921A1E774B455EFA0
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFC98
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCA0
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCA8
                                                            • InitializeCriticalSection.KERNEL32(?,005DD3B7,?,005D76C0), ref: 005DFCB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2443818293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2443805121.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.0000000000607000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2443958369.00000000006F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444207581.0000000000936000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444224196.0000000000938000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444236784.000000000093A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444254738.0000000000944000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444267394.0000000000945000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444280510.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444293054.000000000094C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444308621.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444322243.000000000095F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.0000000000960000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.000000000096C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009A9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444333966.00000000009C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2444408564.00000000009C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_wRhEMj1swo.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInitializeSection
                                                            • String ID:
                                                            • API String ID: 32694325-0
                                                            • Opcode ID: 2bc9a27d71ab4e8de4f6aa7b1144a222d394af5d26f99d7cb11bfd8e037d7805
                                                            • Instruction ID: 2e59d2f79542d63eef59b7d5057a635145d94a90fb1d99f76d98b8f866eeaf26
                                                            • Opcode Fuzzy Hash: 2bc9a27d71ab4e8de4f6aa7b1144a222d394af5d26f99d7cb11bfd8e037d7805
                                                            • Instruction Fuzzy Hash: D4C00231C2F2349BCF362B67FD0584A3F66EB442663011067A5045203096722D10FFD1